text
stringlengths
27
153
label
stringlengths
27
153
id
int64
0
40k
individuals these separately requires cases the are not that explicitly reasoning about of mentioned. Neither
Neither of these cases requires reasoning separately about the individuals that are not explicitly mentioned.
3,300
and how a diverse techniques framework. general the propose in show the fit We framework
We propose a general framework and show how the diverse techniques fit in the framework.
3,301
the matching. framework relation data consider From ontology and between interlinking we this
From this framework we consider the relation between data interlinking and ontology matching.
3,302
deviations in of paper the studies the stochastic a problem. multi-armed This bandit regret
This paper studies the deviations of the regret in a stochastic multi-armed bandit problem.
3,303
trade-off the cellular In / paper, this exploitation exploration algorithms. study in genetic we
In this paper, we study the exploration / exploitation trade-off in cellular genetic algorithms.
3,304
The to is used explain punctuated these results. equilibria model
The punctuated equilibria model is used to explain these results.
3,305
HyFlex, paper development software a presents of search This the methodologies. framework for cross-domain
This paper presents HyFlex, a software framework for the development of cross-domain search methodologies.
3,306
Mean-shift tracking in known a and method well object is popular used tracking problems.
Mean-shift tracking is a popular and well known method used in object tracking problems.
3,307
world-wide results of psychology. present scientometric in excellence We about centers
We present scientometric results about world-wide centers of excellence in psychology.
3,308
the AUC result, a this clear first Brier the As and establishes between score. connection
As a result, this establishes the first clear connection between AUC and the Brier score.
3,309
increases tip the The wave. probability surfing the towards strongly of
The surfing probability strongly increases towards the tip of the wave.
3,310
front Thus, arise in at wave. the an successful intermediate most position of the mutations
Thus, most successful mutations arise at an intermediate position in the front of the wave.
3,311
for association basis tools provides (and It implication rules). with reasoning
It provides tools for reasoning with implication basis (and association rules).
3,312
Knowledge-Based a build to reasoning. system confidence is applied It for
It is applied to build a Knowledge-Based system for confidence reasoning.
3,313
utility recovered. ignored, expected are costs the When is maximum resource principle
When resource costs are ignored, the maximum expected utility principle is recovered.
3,314
not species of selection mechanism understood. ionic is and The clearly of gating
The mechanism of gating and selection of ionic species is not clearly understood.
3,315
used version with evaluation. additional extended reported in The provides that resources were the appendices
The extended version provides appendices with additional resources that were used in the reported evaluation.
3,316
algorithm, (a.k.a. OEM propose an We called
We propose an algorithm, called OEM (a.k.a.
3,317
orthogonalizing problems. for EM), ious least intended squares var-
orthogonalizing EM), intended for var- ious least squares problems.
3,318
new rows. The imputes of step the the responses second
The second step imputes the responses of the new rows.
3,319
forms, until have closed convergence. third and second steps simple The iterate and
The second and third steps have simple closed forms, and iterate until convergence.
3,320
Convergence of algorithm are rate and examined. the convergence
Convergence and convergence rate of the algorithm are examined.
3,321
new provides theoretical This these methods. a comparison between
This provides a new theoretical comparison between these methods.
3,322
to illustrate examples Numerical proposed provided the are algorithm.
Numerical examples are provided to illustrate the proposed algorithm.
3,323
response such control. is One form adaptive of gain
One form of such adaptive response is gain control.
3,324
variance. this most collapses proposed of system The
The system proposed collapses most of this variance.
3,325
to then in case. matched in mark face the used laboratory, The attendance our is
The matched face is then used to mark attendance in the laboratory, in our case.
3,326
implies process. heterogeneity contingency the in This evolutionary
This heterogeneity implies contingency in the evolutionary process.
3,327
commonplace hundreds becoming High-dimensional of many observations in data of with disciplines. thousands are
High-dimensional data with hundreds of thousands of observations are becoming commonplace in many disciplines.
3,328
performance the method through simulation assessed of The studies. is
The performance of the method is assessed through simulation studies.
3,329
numerous natural Large may subject to populations simultaneously contain polymorphisms selection. segregating
Large populations may contain numerous simultaneously segregating polymorphisms subject to natural selection.
3,330
when alleles, recombination is associations is disrupts strong rare. recombination draft Since between
Since recombination disrupts associations between alleles, draft is strong when recombination is rare.
3,331
Finally, through draft two accelerates the of intermediates. adaptations step rate deleterious
Finally, draft accelerates the rate of two step adaptations through deleterious intermediates.
3,332
an of learns compression. We data algorithm through give a that representation
We give an algorithm that learns a representation of data through compression.
3,333
can sweep single the the be from samples model through Independent pixels. drawn a by
Independent samples can be drawn from the model by a single sweep through the pixels.
3,334
programming introduce new a Programming called (COP). Oriented paradigm So we Consciousness
So we introduce a new programming paradigm called Consciousness Oriented Programming (COP).
3,335
the undirected directed for graphs. method of prove We and consistency
We prove consistency of the method for directed and undirected graphs.
3,336
blockmodel. consistent consistent assignment stochastic for The a parameter estimation makes block possible
The consistent block assignment makes possible consistent parameter estimation for a stochastic blockmodel.
3,337
graphs. is even for computationally very large also feasible Our method
Our method is also computationally feasible even for very large graphs.
3,338
the of model through entities system. a flow passive they
they model the flow of passive entities through a system.
3,339
commonly Self-Organizing purposes. are used unsupervised Maps for learning
Self-Organizing Maps are commonly used for unsupervised learning purposes.
3,340
to little attention relatively so knowledge their representation, specifications received Despite epistemic far. have relevance
Despite their relevance to knowledge representation, epistemic specifications have received relatively little attention so far.
3,341
we In this specification. the revisit of paper, epistemic formalism
In this paper, we revisit the formalism of epistemic specification.
3,342
appearance setting. generative of Bayesian shape in a This hierarchical model a and paper investigates
This paper investigates a hierarchical Bayesian model of shape and appearance in a generative setting.
3,343
ongoing work meta-reasoning is which aims applying to MCTS, non-trivial. at This techniques
This ongoing work aims at applying meta-reasoning techniques to MCTS, which is non-trivial.
3,344
Finite-time policies empirically. is are compared the and and analysis algorithms of the asymptotic provided,
Finite-time and asymptotic analysis of the policies is provided, and the algorithms are compared empirically.
3,345
the paper second Reiter The compare to of is Moore. and of our goal work
The second goal of our paper is to compare the work of Reiter and Moore.
3,346
modeling information. allows one recovering imaging that Sparse lost is techniques of efficient the for
Sparse modeling is one of the efficient techniques for imaging that allows recovering lost information.
3,347
solution the reconstruction. The optimal algorithm the object enables for wave developed field
The developed algorithm enables the optimal solution for the object wave field reconstruction.
3,348
quality an improvement conventional to the goal Our the reconstruction algorithms. respect of is with
Our goal is an improvement of the reconstruction quality with respect to the conventional algorithms.
3,349
significant in results and accuracy, demonstrate of simulations enhancement numerical reconstruction advanced Sparse imaging. regularization
Sparse regularization results in advanced reconstruction accuracy, and numerical simulations demonstrate significant enhancement of imaging.
3,350
Detecting edges processing. quality for image objects is images within of the critical
Detecting the edges of objects within images is critical for quality image processing.
3,351
classic detectors. the performed than Our amoeba-based better edge edge-detection system
Our amoeba-based edge-detection system performed better than the classic edge detectors.
3,352
probability variables weather disturbances. extremes of climate of consequent variance increases and the Higher catastrophic
Higher variance of climate variables increases the probability of weather extremes and consequent catastrophic disturbances.
3,353
directional variation pressure, selection the the model of are environment. and Parameters stochastic of mutation,
Parameters of the model are selection pressure, mutation, directional and stochastic variation of the environment.
3,354
directional track phenotype. the of able is the In system component the to optimum general,
In general, the system is able to track the directional component of the optimum phenotype.
3,355
to first We approach. evaluations feasibility provide this experimental the show of
We provide first experimental evaluations to show the feasibility of this approach.
3,356
Remembered those episodes are telling. exactly are worth which
Remembered episodes are exactly those which are worth telling.
3,357
the Using introduced allows factors swiftly. accurate here, results getting
Using the factors introduced here, allows getting accurate results swiftly.
3,358
to solution compute presented. accuracy is The the mathematical generic
The generic mathematical solution to compute the accuracy is presented.
3,359
described. precise approximate and computations The are
The approximate and precise computations are described.
3,360
of detection. conceptions of emergence as instances the are phenomenon of reconciled two different Two
Two different conceptions of emergence are reconciled as two instances of the phenomenon of detection.
3,361
of Conversely, emerge may some as modularity trait. by-product a
Conversely, modularity may emerge as a by-product of some trait.
3,362
the We modularity ask versatility metabolic networks. of whether here affects
We here ask whether versatility affects the modularity of metabolic networks.
3,363
to This language. the for in encodings simpler standard compared allows ASP ones much
This allows for much simpler encodings compared to the ones in standard ASP language.
3,364
encodings novel introduced we the for semantics. Moreover, resolution-based grounded provide recently
Moreover, we provide novel encodings for the recently introduced resolution-based grounded semantics.
3,365
undertake of attempts image to So, paper fusion. study the This Feature-Level based
So, This paper attempts to undertake the study of Feature-Level based image fusion.
3,366
feature this we Hence, paper fusion. (FE) for extraction in consider
Hence, in this paper we consider feature extraction (FE) for fusion.
3,367
included term in number are of A 'consciousness'. the concepts
A number of concepts are included in the term 'consciousness'.
3,368
an is epiphenomenon adaptive ? or function, it it have Does an
Does it have an adaptive function, or is it an epiphenomenon ?
3,369
reject to give We arguments second alternative. shall the
We shall give arguments to reject the second alternative.
3,370
confidentiality. particular, we credulous analyze non-monotonic affects reasoning In how
In particular, we analyze how credulous non-monotonic reasoning affects confidentiality.
3,371
the was by for The easy LC-MS/MS. sequence monitoring BAP status of redesigned biotinylation
The BAP sequence was redesigned for easy monitoring of the biotinylation status by LC-MS/MS.
3,372
finger is possible. and shows that between discrimination This movements EEG wrist
This shows that EEG discrimination between wrist and finger movements is possible.
3,373
research motor to research. introduces The tasks a BCI of new combination
The research introduces a new combination of motor tasks to BCI research.
3,374
Concave provide procedures regularization sparse methods recovery. for natural
Concave regularization methods provide natural procedures for sparse recovery.
3,375
in However, dimensional to are high analyze they setting. the difficult
However, they are difficult to analyze in the high dimensional setting.
3,376
present discuss this overview Under an and of unified connections. framework, existing we their results
Under this unified framework, we present an overview of existing results and discuss their connections.
3,377
relational applied of domains. learning been a range Statistical techniques successfully in wide have relational
Statistical relational learning techniques have been successfully applied in a wide range of relational domains.
3,378
an established paradigm. programming (ASP) is Programming Answer-Set declarative
Answer-Set Programming (ASP) is an established declarative programming paradigm.
3,379
over modularity desired results. for is increasing access place---(meta-)reasoning feature in proper and---assuming The subprogram
The feature is desired for increasing modularity and---assuming proper access in place---(meta-)reasoning over subprogram results.
3,380
sets the can be individually answer called of sub-programs Notably, accessed.
Notably, the answer sets of called sub-programs can be individually accessed.
3,381
We a to product interactive present approach configuration. constraint-based
We present a constraint-based approach to interactive product configuration.
3,382
the process, optimizations. configuration show techniques underlying discuss explain the We and
We discuss the configuration process, explain the underlying techniques and show optimizations.
3,383
this tool help paper, on to CADe cancer. detect radiologist In interested to we
In this paper, we interested on CADe tool to help radiologist to detect cancer.
3,384
detection, analysis classification. three-step a based and namely, The flow; CADe on proposed is work
The proposed CADe is based on a three-step work flow; namely, detection, analysis and classification.
3,385
visual approach information radiologist. gives good the This from
This approach gives good visual information from the radiologist.
3,386
the present to application the mathematical hypothesis-rich We data. of genome-wide theory first association
We present the first application of the hypothesis-rich mathematical theory to genome-wide association data.
3,387
late-onset sporadic Parkinson's genome-wide was analyzed. association disease study dataset
late-onset sporadic Parkinson's disease genome-wide association study dataset was analyzed.
3,388
and are These in DSLs reification. used selection propagator constraint
These DSLs are used in propagator selection and constraint reification.
3,389
overheads. specifications reducing translated Prolog run-time code, interpretative compilation At to are time, these
At compilation time, these specifications are translated to Prolog code, reducing interpretative run-time overheads.
3,390
NLPR database. view videos system of side proposed using The evaluated is
The proposed system is evaluated using side view videos of NLPR database.
3,391
VQ compression constructed technique depends of performance The the codebook. upon image based
The performance of VQ based image compression technique depends upon the constructed codebook.
3,392
design algorithm. used for A codebook VQ technique widely the is (LBG) Linde-Buzo-Gray
A widely used technique for VQ codebook design is the Linde-Buzo-Gray (LBG) algorithm.
3,393
SAT important in for since is removed. performance Preprocessing a be redundancy can formula
Preprocessing a formula in SAT is important for performance since redundancy can be removed.
3,394
The is Coprocessor. is called riss SAT of and part preprocessor the solver
The preprocessor is part of the SAT solver riss and is called Coprocessor.
3,395
priors intractable lead to in However, these computationally general models.
However, these priors in general lead to computationally intractable models.
3,396
do how truly when know agent we an intelligent? But is
But how do we know when an agent is truly intelligent?
3,397
carried be could practically such out. how then We sketch testing
We then sketch how such testing could practically be carried out.
3,398
regions. tumor wavelet feature derived set texture and from is A statistical based normal
A wavelet based statistical texture feature set is derived from normal and tumor regions.
3,399