inputs dict | prediction null | prediction_agent null | annotation list | annotation_agent null | multi_label bool 1
class | explanation null | id stringlengths 1 5 | metadata null | status stringclasses 2
values | event_timestamp null | metrics null |
|---|---|---|---|---|---|---|---|---|---|---|---|
{
"text": "Memory Aware Synapses: Learning what (not) to forget"
} | null | null | [
"Computer Science",
"Statistics"
] | null | true | null | 101 | null | Validated | null | null |
{
"text": "Uniform Spectral Convergence of the Stochastic Galerkin Method for the Linear Semiconductor Boltzmann Equation with Random Inputs and Diffusive Scalings"
} | null | null | null | null | true | null | 102 | null | Default | null | null |
{
"text": "On Improving the Capacity of Solving Large-scale Wireless Network Design Problems by Genetic Algorithms"
} | null | null | [
"Computer Science",
"Mathematics"
] | null | true | null | 103 | null | Validated | null | null |
{
"text": "Quasi two-dimensional Fermi surface topography of the delafossite PdRhO$_2$"
} | null | null | null | null | true | null | 104 | null | Default | null | null |
{
"text": "A Variational Characterization of Rényi Divergences"
} | null | null | null | null | true | null | 105 | null | Default | null | null |
{
"text": "Interlayer coupling and gate-tunable excitons in transition metal dichalcogenide heterostructures"
} | null | null | null | null | true | null | 106 | null | Default | null | null |
{
"text": "Enumeration of singular varieties with tangency conditions"
} | null | null | null | null | true | null | 107 | null | Default | null | null |
{
"text": "In-home and remote use of robotic body surrogates by people with profound motor deficits"
} | null | null | null | null | true | null | 108 | null | Default | null | null |
{
"text": "ClusterNet: Detecting Small Objects in Large Scenes by Exploiting Spatio-Temporal Information"
} | null | null | null | null | true | null | 109 | null | Default | null | null |
{
"text": "Monte Carlo Tree Search with Sampled Information Relaxation Dual Bounds"
} | null | null | null | null | true | null | 110 | null | Default | null | null |
{
"text": "Fermi-edge singularity and the functional renormalization group"
} | null | null | null | null | true | null | 111 | null | Default | null | null |
{
"text": "Towards \"AlphaChem\": Chemical Synthesis Planning with Tree Search and Deep Neural Network Policies"
} | null | null | null | null | true | null | 112 | null | Default | null | null |
{
"text": "The quasi-Assouad dimension for stochastically self-similar sets"
} | null | null | null | null | true | null | 113 | null | Default | null | null |
{
"text": "Influence of Spin Orbit Coupling in the Iron-Based Superconductors"
} | null | null | null | null | true | null | 114 | null | Default | null | null |
{
"text": "Effect of Meltdown and Spectre Patches on the Performance of HPC Applications"
} | null | null | [
"Computer Science"
] | null | true | null | 115 | null | Validated | null | null |
{
"text": "Gene regulatory network inference: an introductory survey"
} | null | null | null | null | true | null | 116 | null | Default | null | null |
{
"text": "Optic Disc and Cup Segmentation Methods for Glaucoma Detection with Modification of U-Net Convolutional Neural Network"
} | null | null | null | null | true | null | 117 | null | Default | null | null |
{
"text": "Automatic Analysis, Decomposition and Parallel Optimization of Large Homogeneous Networks"
} | null | null | null | null | true | null | 118 | null | Default | null | null |
{
"text": "Robust Contextual Bandit via the Capped-$\\ell_{2}$ norm"
} | null | null | [
"Computer Science",
"Statistics"
] | null | true | null | 119 | null | Validated | null | null |
{
"text": "Improper posteriors are not improper"
} | null | null | null | null | true | null | 120 | null | Default | null | null |
{
"text": "Fault Tolerant Consensus Agreement Algorithm"
} | null | null | null | null | true | null | 121 | null | Default | null | null |
{
"text": "Congestion Barcodes: Exploring the Topology of Urban Congestion Using Persistent Homology"
} | null | null | null | null | true | null | 122 | null | Default | null | null |
{
"text": "Once in a blue moon: detection of 'bluing' during debris transits in the white dwarf WD1145+017"
} | null | null | [
"Physics"
] | null | true | null | 123 | null | Validated | null | null |
{
"text": "Viscous dynamics of drops and bubbles in Hele-Shaw cells: drainage, drag friction, coalescence, and bursting"
} | null | null | null | null | true | null | 124 | null | Default | null | null |
{
"text": "Stacking-based Deep Neural Network: Deep Analytic Network on Convolutional Spectral Histogram Features"
} | null | null | null | null | true | null | 125 | null | Default | null | null |
{
"text": "Superconductivity and Frozen Electronic States at the (111) LaAlO$_3$/SrTiO$_3$ Interface"
} | null | null | null | null | true | null | 126 | null | Default | null | null |
{
"text": "Emittance preservation of an electron beam in a loaded quasi-linear plasma wakefield"
} | null | null | [
"Physics"
] | null | true | null | 127 | null | Validated | null | null |
{
"text": "Detection of Nonlinearly Distorted OFDM Signals via Generalized Approximate Message Passing"
} | null | null | [
"Computer Science"
] | null | true | null | 128 | null | Validated | null | null |
{
"text": "Nonlinear fractal meaning of the Hubble constant"
} | null | null | null | null | true | null | 129 | null | Default | null | null |
{
"text": "SEA: String Executability Analysis by Abstract Interpretation"
} | null | null | null | null | true | null | 130 | null | Default | null | null |
{
"text": "On the trade-off between labels and weights in quantitative bisimulation"
} | null | null | null | null | true | null | 131 | null | Default | null | null |
{
"text": "Poynting's theorem in magnetic turbulence"
} | null | null | null | null | true | null | 132 | null | Default | null | null |
{
"text": "Polar factorization of conformal and projective maps of the sphere in the sense of optimal mass transport"
} | null | null | [
"Mathematics"
] | null | true | null | 133 | null | Validated | null | null |
{
"text": "Representing numbers as the sum of squares and powers in the ring $\\mathbb{Z}_n$"
} | null | null | [
"Mathematics"
] | null | true | null | 134 | null | Validated | null | null |
{
"text": "Spatial Regression and the Bayesian Filter"
} | null | null | null | null | true | null | 135 | null | Default | null | null |
{
"text": "Behaviour of electron content in the ionospheric D-region during solar X-ray flares"
} | null | null | null | null | true | null | 136 | null | Default | null | null |
{
"text": "Fractional compound Poisson processes with multiple internal states"
} | null | null | [
"Mathematics",
"Statistics"
] | null | true | null | 137 | null | Validated | null | null |
{
"text": "Zero-point spin-fluctuations of single adatoms"
} | null | null | null | null | true | null | 138 | null | Default | null | null |
{
"text": "Exploration-exploitation tradeoffs dictate the optimal distributions of phenotypes for populations subject to fitness fluctuations"
} | null | null | [
"Quantitative Biology"
] | null | true | null | 139 | null | Validated | null | null |
{
"text": "Evaluating openEHR for storing computable representations of electronic health record phenotyping algorithms"
} | null | null | [
"Computer Science"
] | null | true | null | 140 | null | Validated | null | null |
{
"text": "Optimizing Mission Critical Data Dissemination in Massive IoT Networks"
} | null | null | null | null | true | null | 141 | null | Default | null | null |
{
"text": "Interference of two co-directional exclusion processes in the presence of a static bottleneck: a biologically motivated model"
} | null | null | null | null | true | null | 142 | null | Default | null | null |
{
"text": "Gaussian fluctuations of Jack-deformed random Young diagrams"
} | null | null | null | null | true | null | 143 | null | Default | null | null |
{
"text": "Revisiting (logarithmic) scaling relations using renormalization group"
} | null | null | null | null | true | null | 144 | null | Default | null | null |
{
"text": "Concentration of weakly dependent Banach-valued sums and applications to statistical learning methods"
} | null | null | null | null | true | null | 145 | null | Default | null | null |
{
"text": "Evolution of the Kondo lattice electronic structure above the transport coherence temperature"
} | null | null | null | null | true | null | 146 | null | Default | null | null |
{
"text": "On A Conjecture Regarding Permutations Which Destroy Arithmetic Progressions"
} | null | null | null | null | true | null | 147 | null | Default | null | null |
{
"text": "Inverse monoids and immersions of cell complexes"
} | null | null | null | null | true | null | 148 | null | Default | null | null |
{
"text": "Not even wrong: The spurious link between biodiversity and ecosystem functioning"
} | null | null | null | null | true | null | 149 | null | Default | null | null |
{
"text": "Evidence of Fraud in Brazil's Electoral Campaigns Via the Benford's Law"
} | null | null | null | null | true | null | 150 | null | Default | null | null |
{
"text": "A Berkeley View of Systems Challenges for AI"
} | null | null | null | null | true | null | 151 | null | Default | null | null |
{
"text": "Equivariant infinite loop space theory, I. The space level story"
} | null | null | null | null | true | null | 152 | null | Default | null | null |
{
"text": "Arithmetic purity of strong approximation for homogeneous spaces"
} | null | null | null | null | true | null | 153 | null | Default | null | null |
{
"text": "Flatness results for nonlocal minimal cones and subgraphs"
} | null | null | null | null | true | null | 154 | null | Default | null | null |
{
"text": "Effective Asymptotic Formulae for Multilinear Averages of Multiplicative Functions"
} | null | null | null | null | true | null | 155 | null | Default | null | null |
{
"text": "On the apparent permeability of porous media in rarefied gas flows"
} | null | null | null | null | true | null | 156 | null | Default | null | null |
{
"text": "Small subgraphs and their extensions in a random distance graph"
} | null | null | null | null | true | null | 157 | null | Default | null | null |
{
"text": "Increasing the Reusability of Enforcers with Lifecycle Events"
} | null | null | null | null | true | null | 158 | null | Default | null | null |
{
"text": "A Fast Interior Point Method for Atomic Norm Soft Thresholding"
} | null | null | null | null | true | null | 159 | null | Default | null | null |
{
"text": "Optimal Experiment Design for Causal Discovery from Fixed Number of Experiments"
} | null | null | null | null | true | null | 160 | null | Default | null | null |
{
"text": "Economically Efficient Combined Plant and Controller Design Using Batch Bayesian Optimization: Mathematical Framework and Airborne Wind Energy Case Study"
} | null | null | null | null | true | null | 161 | null | Default | null | null |
{
"text": "The 10 phases of spin chains with two Ising symmetries"
} | null | null | null | null | true | null | 162 | null | Default | null | null |
{
"text": "Generalized subspace subcodes with application in cryptology"
} | null | null | null | null | true | null | 163 | null | Default | null | null |
{
"text": "Lagrangian fibers of Gelfand-Cetlin systems"
} | null | null | null | null | true | null | 164 | null | Default | null | null |
{
"text": "A local ensemble transform Kalman particle filter for convective scale data assimilation"
} | null | null | null | null | true | null | 165 | null | Default | null | null |
{
"text": "Tensor Robust Principal Component Analysis with A New Tensor Nuclear Norm"
} | null | null | null | null | true | null | 166 | null | Default | null | null |
{
"text": "Resolving the age bimodality of galaxy stellar populations on kpc scales"
} | null | null | null | null | true | null | 167 | null | Default | null | null |
{
"text": "Hidden long evolutionary memory in a model biochemical network"
} | null | null | null | null | true | null | 168 | null | Default | null | null |
{
"text": "On Study of the Reliable Fully Convolutional Networks with Tree Arranged Outputs (TAO-FCN) for Handwritten String Recognition"
} | null | null | [
"Computer Science"
] | null | true | null | 169 | null | Validated | null | null |
{
"text": "Marcel Riesz on Nörlund Means"
} | null | null | null | null | true | null | 170 | null | Default | null | null |
{
"text": "Mathematics of Isogeny Based Cryptography"
} | null | null | null | null | true | null | 171 | null | Default | null | null |
{
"text": "Modeling of drug diffusion in a solid tumor leading to tumor cell death"
} | null | null | null | null | true | null | 172 | null | Default | null | null |
{
"text": "Sensitivity analysis for inverse probability weighting estimators via the percentile bootstrap"
} | null | null | null | null | true | null | 173 | null | Default | null | null |
{
"text": "From 4G to 5G: Self-organized Network Management meets Machine Learning"
} | null | null | null | null | true | null | 174 | null | Default | null | null |
{
"text": "Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation"
} | null | null | null | null | true | null | 175 | null | Default | null | null |
{
"text": "A New Family of Near-metrics for Universal Similarity"
} | null | null | null | null | true | null | 176 | null | Default | null | null |
{
"text": "Poisoning Attacks to Graph-Based Recommender Systems"
} | null | null | null | null | true | null | 177 | null | Default | null | null |
{
"text": "SU-RUG at the CoNLL-SIGMORPHON 2017 shared task: Morphological Inflection with Attentional Sequence-to-Sequence Models"
} | null | null | null | null | true | null | 178 | null | Default | null | null |
{
"text": "Neural system identification for large populations separating \"what\" and \"where\""
} | null | null | null | null | true | null | 179 | null | Default | null | null |
{
"text": "On the Deployment of Distributed Antennas for Wireless Power Transfer with Safety Electromagnetic Radiation Level Requirement"
} | null | null | [
"Computer Science"
] | null | true | null | 180 | null | Validated | null | null |
{
"text": "A simulation technique for slurries interacting with moving parts and deformable solids with applications"
} | null | null | null | null | true | null | 181 | null | Default | null | null |
{
"text": "Dissipative hydrodynamics in superspace"
} | null | null | null | null | true | null | 182 | null | Default | null | null |
{
"text": "The Two-fold Role of Observables in Classical and Quantum Kinematics"
} | null | null | null | null | true | null | 183 | null | Default | null | null |
{
"text": "On the isoperimetric quotient over scalar-flat conformal classes"
} | null | null | null | null | true | null | 184 | null | Default | null | null |
{
"text": "On the Spectrum of Random Features Maps of High Dimensional Data"
} | null | null | null | null | true | null | 185 | null | Default | null | null |
{
"text": "Minimum energy path calculations with Gaussian process regression"
} | null | null | null | null | true | null | 186 | null | Default | null | null |
{
"text": "Evaluating Roles of Central Users in Online Communication Networks: A Case Study of #PanamaLeaks"
} | null | null | null | null | true | null | 187 | null | Default | null | null |
{
"text": "Best polynomial approximation on the triangle"
} | null | null | null | null | true | null | 188 | null | Default | null | null |
{
"text": "SecureTime: Secure Multicast Time Synchronization"
} | null | null | null | null | true | null | 189 | null | Default | null | null |
{
"text": "Solving the multi-site and multi-orbital Dynamical Mean Field Theory using Density Matrix Renormalization"
} | null | null | null | null | true | null | 190 | null | Default | null | null |
{
"text": "Topologically Invariant Double Dirac States in Bismuth based Perovskites: Consequence of Ambivalent Charge States and Covalent Bonding"
} | null | null | null | null | true | null | 191 | null | Default | null | null |
{
"text": "Identitas: A Better Way To Be Meaningless"
} | null | null | null | null | true | null | 192 | null | Default | null | null |
{
"text": "Learning from Between-class Examples for Deep Sound Recognition"
} | null | null | null | null | true | null | 193 | null | Default | null | null |
{
"text": "DAGGER: A sequential algorithm for FDR control on DAGs"
} | null | null | [
"Mathematics",
"Statistics"
] | null | true | null | 194 | null | Validated | null | null |
{
"text": "On nonlinear profile decompositions and scattering for a NLS-ODE model"
} | null | null | null | null | true | null | 195 | null | Default | null | null |
{
"text": "Blockchain and human episodic memory"
} | null | null | [
"Quantitative Biology"
] | null | true | null | 196 | null | Validated | null | null |
{
"text": "Epidemic Spreading and Aging in Temporal Networks with Memory"
} | null | null | null | null | true | null | 197 | null | Default | null | null |
{
"text": "The Shattered Gradients Problem: If resnets are the answer, then what is the question?"
} | null | null | null | null | true | null | 198 | null | Default | null | null |
{
"text": "Pr$_2$Ir$_2$O$_7$: when Luttinger semimetal meets Melko-Hertog-Gingras spin ice state"
} | null | null | null | null | true | null | 199 | null | Default | null | null |
{
"text": "A 2-edge partial inverse problem for the Sturm-Liouville operators with singular potentials on a star-shaped graph"
} | null | null | [
"Mathematics"
] | null | true | null | 200 | null | Validated | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.