text stringlengths 27 153 | label stringlengths 27 153 | id int64 0 40k |
|---|---|---|
This intrinsic stochasticity? Does this raises significant two irregularity imply questions: | This raises two questions: Does this irregularity imply significant intrinsic stochasticity? | 2,800 |
long to at neuron existing Can be models extended readily describe behavior timescales? | Can existing neuron models be readily extended to describe behavior at long timescales? | 2,801 |
and questions, we to Thus "no" above answer respectively. the "yes" | Thus we answer "yes" and "no" to the above questions, respectively. | 2,802 |
speciation. the sympatric of problem This is | This is the problem of sympatric speciation. | 2,803 |
However, not mating entirely need random. be | However, mating need not be entirely random. | 2,804 |
are probabilities the in rare of of in interested computer events experiments. bounding context We | We are interested in bounding probabilities of rare events in the context of computer experiments. | 2,805 |
on events variables. the output of physical with rare a input These random depend model | These rare events depend on the output of a physical model with random input variables. | 2,806 |
deal sampling then importance on to difficulty a We strategy with propose methods. this based | We then propose a strategy to deal with this difficulty based on importance sampling methods. | 2,807 |
is Kriging into the due account. properly step taken The variability to metamodeling | The variability due to the Kriging metamodeling step is properly taken into account. | 2,808 |
study case Finally, challenging analyzed. a is real | Finally, a challenging real case study is analyzed. | 2,809 |
model. consists standard generative `spike-and-slab' of a Gaussian The underlying model and prior noise a | The underlying generative model consists of a standard `spike-and-slab' prior and a Gaussian noise model. | 2,810 |
by Closed-form solutions M-step and probabilistic generalizing are equations derived for PCA. E- | Closed-form solutions for E- and M-step equations are derived by generalizing probabilistic PCA. | 2,811 |
resulting a account. algorithm potentially posterior of can take into all multi-modal The EM modes | The resulting EM algorithm can take all modes of a potentially multi-modal posterior into account. | 2,812 |
cost of The the scales with algorithm exponentially hidden computational of the number dimensions. | The computational cost of the algorithm scales exponentially with the number of hidden dimensions. | 2,813 |
range the source model tasks. can to applied be separation of typical the Thus | Thus the model can be applied to the typical range of source separation tasks. | 2,814 |
which To he this species random. interact large prove point, at networks analyzed in | To prove this point, he analyzed large networks in which species interact at random. | 2,815 |
have pairs systems However, natural mutualistic predator-prey, (e.g., well-defined interactions or competitive). of in species | However, in natural systems pairs of species have well-defined interactions (e.g., predator-prey, mutualistic or competitive). | 2,816 |
all stability analytic provide criteria cases. We for | We provide analytic stability criteria for all cases. | 2,817 |
results ecology. broad in applicability These have | These results have broad applicability in ecology. | 2,818 |
mutualistic stability is by in negatively impacted nestedness Similarly, networks. bipartite | Similarly, stability is negatively impacted by nestedness in bipartite mutualistic networks. | 2,819 |
pages. World of no longer consists just Wide HTML The Web | The World Wide Web no longer consists just of HTML pages. | 2,820 |
the grows top On a common structured Semantic of as Web data XML, source. | On top of XML, the Semantic Web grows as a common structured data source. | 2,821 |
we In detail. explain first of this these developments work, in each | In this work, we first explain each of these developments in detail. | 2,822 |
domains. the also we in these the On avenues current research illustrate way, | On the way, we also illustrate the current research avenues in these domains. | 2,823 |
inferring cloud data. point methodology underlying topology the for A proposed is | A methodology is proposed for inferring the topology underlying point cloud data. | 2,824 |
models. Gaussian an popular, extremely flexible class are models Latent of | Latent Gaussian models are an extremely popular, flexible class of models. | 2,825 |
however, tricky these is, for and consuming. inference models Bayesian time | Bayesian inference for these models is, however, tricky and time consuming. | 2,826 |
we In the approximation this INLA and related outline its R package. paper, | In this paper, we outline the INLA approximation and its related R package. | 2,827 |
factorization. and of finite models, It mixture conjugate calculation properties the families exploits | It exploits the calculation properties of finite mixture models, conjugate families and factorization. | 2,828 |
certain This ability, extremely situations, is useful in most in alternative not methods. found | This ability, extremely useful in certain situations, is not found in most alternative methods. | 2,829 |
of such examples procedure Markov replica construct the a hidden for We models. | We construct the examples of such a replica procedure for hidden Markov models. | 2,830 |
and based describes parts. classifies data pattern on recognition features relationships Structural and of the | Structural pattern recognition describes and classifies data based on the relationships of features and parts. | 2,831 |
structure number, dimension. of the characterize Topological objects like invariants, of any Euler the | Topological invariants, like the Euler number, characterize the structure of objects of any dimension. | 2,832 |
provide invariants a more to homology. refined can topological space Cohomology does algebraic than | Cohomology can provide more refined algebraic invariants to a topological space than does homology. | 2,833 |
of dimension. to homology used the chains characterize holes assigns any in to It `quantities' | It assigns `quantities' to the chains used in homology to characterize holes of any dimension. | 2,834 |
and invariant scanning An is extension obtain given. to cocycles rotation | An extension to obtain scanning and rotation invariant cocycles is given. | 2,835 |
the to architecture: reasoning. perform introduce cognitive Xapagy designed a software system We narrative | We introduce the Xapagy cognitive architecture: a software system designed to perform narrative reasoning. | 2,836 |
smoother substantial a has a base bias. resulting The variance small but | The resulting base smoother has a small variance but a substantial bias. | 2,837 |
in the their Then, package implementation. the rules available explain and stopping we | Then, we explain the stopping rules available in the package and their implementation. | 2,838 |
modeling has Hepatitis paper. dynamics A this presented (HCV) in been of C Virus mathematical | A mathematical modeling of Hepatitis C Virus (HCV) dynamics has been presented in this paper. | 2,839 |
computed on complexes. has traditionally Cohomology simplicial been ring | Cohomology ring has been traditionally computed on simplicial complexes. | 2,840 |
decisions suggest may lead and belief to A wrong actions. false harmful | A false belief may suggest wrong decisions and lead to harmful actions. | 2,841 |
as So beliefs to false as important goal possible. make unlikely is an | So an important goal is to make false beliefs as unlikely as possible. | 2,842 |
in forms cancer women Uterine of Cervical Cancer the is one most worldwide. of common | Uterine Cervical Cancer is one of the most common forms of cancer in women worldwide. | 2,843 |
images form. in cervigrams Colposcopy, During acquired are raw colposcopic or Digital | During Digital Colposcopy, colposcopic images or cervigrams are acquired in raw form. | 2,844 |
about of half The image. raw cervix region occupies the cervigram | The cervix region occupies about half of the raw cervigram image. | 2,845 |
the of cervix. identification the tissues This information automatic irrelevant can confuse within | This irrelevant information can confuse automatic identification of the tissues within the cervix. | 2,846 |
a the solution five-point give problem. well-known pose relative to new algorithmic We | We give a new algorithmic solution to the well-known five-point relative pose problem. | 2,847 |
cubic deal an with famous the matrix. not does on approach essential constraint Our | Our approach does not deal with the famous cubic constraint on an essential matrix. | 2,848 |
induced. of can nucleation complexes or Scaffold-mediated protein either constitutive be | Scaffold-mediated nucleation of protein complexes can be either constitutive or induced. | 2,849 |
the resolved before must make This towards goals. can achieving plans be its crisis agent | This crisis must be resolved before the agent can make plans towards achieving its goals. | 2,850 |
a is forgery. of splicing Image form common image | Image splicing is a common form of image forgery. | 2,851 |
no clues alterations of tampering. may visual leave Such | Such alterations may leave no visual clues of tampering. | 2,852 |
camera are are characteristic and inherent Such unique. camera from constant manufacturing properties processes | Such constant camera characteristic properties are inherent from camera manufacturing processes and are unique. | 2,853 |
used. the from classification algorithm is independent proposal The | The proposal is independent from the classification algorithm used. | 2,854 |
"Ariadne's planning, approach called to algorithm". a We clew path the present new | We present a new approach to path planning, called the "Ariadne's clew algorithm". | 2,855 |
target. builds looks Explore the while the space accessible Search representation a for of | Explore builds a representation of the accessible space while Search looks for the target. | 2,856 |
found any about show without second a results one pre-processing. that Experimental path in is | Experimental results show that a path is found in about one second without any pre-processing. | 2,857 |
We Wheel' Optimization term general we describe approach (SWO). a optimization which to `Squeaky | We describe a general approach to optimization which we term `Squeaky Wheel' Optimization (SWO). | 2,858 |
cycle until solution is acceptable limit reached, continues found. or some is an Construct/Analyze/Prioritize This | This Construct/Analyze/Prioritize cycle continues until some limit is reached, or an acceptable solution is found. | 2,859 |
and two prioritizations. be viewed spaces: can operating search on SWO as solutions | SWO can be viewed as operating on two search spaces: solutions and prioritizations. | 2,860 |
prioritizations Similarly, constructing successive generated solutions. are analyzing by and | Similarly, successive prioritizations are generated by constructing and analyzing solutions. | 2,861 |
discuss. This which `coupled search' has properties, we interesting some | This `coupled search' has some interesting properties, which we discuss. | 2,862 |
disadvantages. Top-down approaches have and specific advantages and each bottom-up theorem proving | Top-down and bottom-up theorem proving approaches each have specific advantages and disadvantages. | 2,863 |
prover a are subgoal A they top-down generates by clauses, prover. bottom-up processed then | A top-down prover generates subgoal clauses, they are then processed by a bottom-up prover. | 2,864 |
the use second The deals in bottom-up a lemmas with top-down technique of prover. generated | The second technique deals with the use of bottom-up generated lemmas in a top-down prover. | 2,865 |
the areas We and model of apply to elimination superposition. our concept | We apply our concept to the areas of model elimination and superposition. | 2,866 |
of the article investigate default logic. latter formalizations we in Reiter's this approach In | In this article we investigate formalizations of the latter approach in Reiter's default logic. | 2,867 |
both decidable. of reasoning is is proposal in notable our that feature cases A | A notable feature of our proposal is that reasoning in both cases is decidable. | 2,868 |
concurrently explore AntNet's and exchange agents network the information. collected | AntNet's agents concurrently explore the network and exchange collected information. | 2,869 |
asynchronous, is mediated the among the communication agents by The network indirect itself. and | The communication among the agents is indirect and asynchronous, mediated by the network itself. | 2,870 |
is typical of social stigmergy. communication form and insects of is called This | This form of communication is typical of social insects and is called stigmergy. | 2,871 |
testbeds. of The algorithms' evaluated over a performance set realistic is | The algorithms' performance is evaluated over a set of realistic testbeds. | 2,872 |
under conditions experimental performance all with AntNet to superior its respect competitors. the showed | AntNet showed superior performance under all the experimental conditions with respect to its competitors. | 2,873 |
the methods %existing previous significantly approximation that these method. known outperform Experiments show best | Experiments show that these methods significantly outperform the previous best known %existing approximation method. | 2,874 |
optimal almost randomly are to generated tested. all find in able manipulations elections the We | We are able to find optimal manipulations in almost all the randomly generated elections tested. | 2,875 |
logic automatic extensive conducted of programs. Recently, control research generation has for on been | Recently, extensive research has been conducted on automatic generation of control for logic programs. | 2,876 |
novel this paper a automatic for algorithm of finding lowest-cost subgoal orderings. In present we | In this paper we present a novel algorithm for automatic finding of lowest-cost subgoal orderings. | 2,877 |
strategy. The divide-and-conquer works using algorithm the | The algorithm works using the divide-and-conquer strategy. | 2,878 |
provably a optimal are yielding subsets and recursively order. The ordered merged, | The subsets are ordered recursively and merged, yielding a provably optimal order. | 2,879 |
variational a in We models. inference approximation describe probabilistic method large-scale for efficient | We describe a variational approximation method for efficient inference in large-scale probabilistic models. | 2,880 |
to probabilities of interest. that deterministic procedures Variational marginal provide and are conditional approximations methods | Variational methods are deterministic procedures that provide approximations to marginal and conditional probabilities of interest. | 2,881 |
sampling or inference provide stochastic search. on methods based to approximate They alternatives | They provide alternatives to approximate inference methods based on stochastic sampling or search. | 2,882 |
a knowledge. and network probabilistic statistical built is model large-scale graphical expert on QMR The | The QMR network is a large-scale probabilistic graphical model built on statistical and expert knowledge. | 2,883 |
The to of conditional comparative disprove Fine same result counterexample is a on used probability. | The same counterexample is used to disprove a result of Fine on comparative conditional probability. | 2,884 |
from quite simpler different those are the answers in framework. The classical | The answers are quite different from those in the simpler classical framework. | 2,885 |
formulae. planning Boolean to we quantified conditional Instead, translate | Instead, we translate conditional planning to quantified Boolean formulae. | 2,886 |
that simple recover of proofs most previous results. provide the We | We provide simple proofs that recover most of the previous results. | 2,887 |
for game. We upper propose bounds semi-bandit new the | We propose new upper bounds for the semi-bandit game. | 2,888 |
three for derive all we Moreover feedback lower bounds assumptions. | Moreover we derive lower bounds for all three feedback assumptions. | 2,889 |
answer et asked we al. a by Koolen Finally, question | Finally, we answer a question asked by Koolen et al. | 2,890 |
systems suggests posses that capacities. different chemical Our semantic different study | Our study suggests that different chemical systems posses different semantic capacities. | 2,891 |
Hypotheses origin evolution life. and concern of the | Hypotheses concern the origin and evolution of life. | 2,892 |
corrections without incurring terms the on Higher-order cost. much variational approach describe further computational | Higher-order terms describe corrections on the variational approach without incurring much further computational cost. | 2,893 |
to is elucidated. approaches as also other such relationship perturbational TAP The | The relationship to other perturbational approaches such as TAP is also elucidated. | 2,894 |
with of over study problem probabilistic the basic constraints events. conditional deduction We | We study the problem of probabilistic deduction with conditional constraints over basic events. | 2,895 |
constraints conditional show We complete is over basic probabilistic deduction with globally NP-hard. that events | We show that globally complete probabilistic deduction with conditional constraints over basic events is NP-hard. | 2,896 |
trees. special the on in We constraint then concentrate conditional of probabilistic case deduction | We then concentrate on the special case of probabilistic deduction in conditional constraint trees. | 2,897 |
complete globally efficient for We deduction. very techniques elaborate probabilistic | We elaborate very efficient techniques for globally complete probabilistic deduction. | 2,898 |
decidable. We the is theory first-order prove that such constraints over also | We also prove that the first-order theory over such constraints is decidable. | 2,899 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.