anchor
stringlengths 10
388
| positive
stringlengths 8
386
|
|---|---|
L2P2: Location-aware location privacy protection for location-based services
|
Location Privacy in Pervasive Computing
|
L2P2: Location-aware location privacy protection for location-based services
|
Feeling-based location privacy protection for location-based services
|
HashKV: enabling efficient updates in KV storage via hashing
|
Atlas: Baidu's key-value storage system for cloud data
|
HashKV: enabling efficient updates in KV storage via hashing
|
Workload analysis of a large-scale key-value store
|
HashKV: enabling efficient updates in KV storage via hashing
|
A Light-weight Compaction Tree to Reduce I / O Amplification toward Efficient Key-Value Stores
|
HashKV: enabling efficient updates in KV storage via hashing
|
Efficient identification of hot data for flash memory storage systems
|
Continuous space language models
|
A Neural Probabilistic Language Model
|
Continuous space language models
|
SRILM -- An extensible language modeling toolkit
|
Colocation Data Center Demand Response Using Nash Bargaining Theory
|
Renewable and cooling aware workload management for sustainable data centers
|
Colocation Data Center Demand Response Using Nash Bargaining Theory
|
Greening geographical load balancing
|
how deep is your bag of words ? .
|
Besting the Quiz Master: Crowdsourcing Incremental Classification Games
|
how deep is your bag of words ? .
|
Recurrent Convolutional Neural Networks for Discourse Compositionality
|
how deep is your bag of words ? .
|
A Structured Vector Space Model for Word Meaning in Context
|
how deep is your bag of words ? .
|
Improving neural networks by preventing co-adaptation of feature detectors
|
Chinese Spelling Check Evaluation at SIGHAN Bake-off 2013
|
Context based spelling correction
|
Design of Novel Shaftless Pump-Jet Propulsor for Multi-Purpose Long-Range and High-Speed Autonomous Underwater Vehicle
|
Design and Performance Analysis of Superconducting Rim-Driven Synchronous Motors for Marine Propulsion
|
Design of Novel Shaftless Pump-Jet Propulsor for Multi-Purpose Long-Range and High-Speed Autonomous Underwater Vehicle
|
Integrated Design and Realization of a Hubless Rim-driven Thruster
|
Design of Novel Shaftless Pump-Jet Propulsor for Multi-Purpose Long-Range and High-Speed Autonomous Underwater Vehicle
|
Optimal design and multifield coupling analysis of propelling motor used in a novel integrated motor propeller
|
Leadership theory and research in the new millennium: Current theoretical trends and changing perspectives
|
The toxic triangle: Destructive leaders, susceptible followers, and conducive environments.
|
Leadership theory and research in the new millennium: Current theoretical trends and changing perspectives
|
The role of leadership in shared mental model convergence and team performance improvement: An agent-based computational model
|
Appearance-based person reidentification in camera networks: problem overview and current approaches
|
A Computational Approach toEdgeDetection
|
Appearance-based person reidentification in camera networks: problem overview and current approaches
|
Watersheds in Digital Spaces: An Efficient Algorithm Based on Immersion Simulations
|
Combating Online In-Auction Fraud: Clues, Techniques and Challenges
|
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
|
Combating Online In-Auction Fraud: Clues, Techniques and Challenges
|
Reputation Systems
|
Margin based permutation variable importance: A stable importance measure for random forest
|
Bias in random forest variable importance measures: Illustrations, sources and a solution
|
Margin based permutation variable importance: A stable importance measure for random forest
|
Robust biomarker identification for cancer diagnosis with ensemble feature selection methods
|
Margin based permutation variable importance: A stable importance measure for random forest
|
Permutation importance: a corrected feature importance measure
|
Active Decision Boundary Annotation with Deep Generative Models
|
Adversarial Feature Learning
|
Active Decision Boundary Annotation with Deep Generative Models
|
Discriminative batch mode active learning
|
Active Decision Boundary Annotation with Deep Generative Models
|
Heterogenous Uncertainty Sampling for Supervised Learning
|
Active Decision Boundary Annotation with Deep Generative Models
|
Generative Visual Manipulation on the Natural Image Manifold
|
A multichannel convolutional neural network for cross-language dialog state tracking
|
Improving neural networks by preventing co-adaptation of feature detectors
|
A multichannel convolutional neural network for cross-language dialog state tracking
|
Character-Aware Neural Language Models
|
A multichannel convolutional neural network for cross-language dialog state tracking
|
Character-level Convolutional Networks for Text Classification
|
A multichannel convolutional neural network for cross-language dialog state tracking
|
Sequence to Sequence Learning with Neural Networks
|
A multichannel convolutional neural network for cross-language dialog state tracking
|
Error Analysis of Statistical Machine Translation Output
|
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis
|
Reinforcement learning: The Good, The Bad and The Ugly
|
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis
|
Temporal Difference Models and Reward-Related Learning in the Human Brain
|
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis
|
Theoretical Neuroscience : Computational and Mathematical Modeling of Neural Systems
|
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis
|
A framework for mesencephalic dopamine systems based on predictive Hebbian learning
|
2.65 GHz 340 W dual internally matched FETs for compact doherty power amplifiers
|
The Doherty Power Amplifier: Review of Recent Solutions and Trends
|
2.65 GHz 340 W dual internally matched FETs for compact doherty power amplifiers
|
2.6 GHz 4 watt GaN-HEMT two-stage power amplifier MMIC for LTE small-cell applications
|
2.65 GHz 340 W dual internally matched FETs for compact doherty power amplifiers
|
An X-band 250W solid-state power amplifier using GaN power HEMTs
|
e-Commerce product classification: our participation at cDiscount 2015 challenge
|
Scikit-learn: Machine Learning in Python
|
e-Commerce product classification: our participation at cDiscount 2015 challenge
|
Large-scale item categorization for e-commerce
|
Emerging topic detection using dictionary learning
|
Online Learning for Matrix Factorization and Sparse Coding
|
Emerging topic detection using dictionary learning
|
Streaming First Story Detection with application to Twitter
|
Emerging topic detection using dictionary learning
|
Probabilistic Latent Semantic Analysis
|
GraphCT: Multithreaded Algorithms for Massive Graph Analysis
|
Massive Social Network Analysis: Mining Twitter for Social Good
|
GraphCT: Multithreaded Algorithms for Massive Graph Analysis
|
SNAP, Small-world Network Analysis and Partitioning: An open-source parallel graph framework for the exploration of large-scale networks
|
GraphCT: Multithreaded Algorithms for Massive Graph Analysis
|
Collective dynamics of ‘small-world’ networks
|
GraphCT: Multithreaded Algorithms for Massive Graph Analysis
|
Exploring Network Structure, Dynamics, and Function using NetworkX
|
Decentralizing attribute-based encryption
|
Multi-Authority Attribute Based Encryption
|
Decentralizing attribute-based encryption
|
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
|
Decentralizing attribute-based encryption
|
Attribute-based encryption for fine-grained access control of encrypted data
|
Decentralizing attribute-based encryption
|
Fuzzy Identity-Based Encryption
|
Sketch-based Geometric Monitoring of Distributed Stream Queries
|
Model-Driven Data Acquisition in Sensor Networks
|
Sketch-based Geometric Monitoring of Distributed Stream Queries
|
adaptive stream resource management using kalman filters .
|
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs
|
iPlane: an information plane for distributed services
|
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs
|
Internet traffic classification using bayesian analysis techniques
|
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs
|
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
|
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY
|
Null space approach of Fisher discriminant analysis for face recognition
|
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY
|
SCface – surveillance cameras face database
|
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY
|
Low-dimensional procedure for the characterization of human faces
|
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY
|
Robust real-time object detection
|
Emergent Translation in Multi-Agent Communication
|
Dual Learning for Machine Translation
|
Emergent Translation in Multi-Agent Communication
|
On the difficulty of training Recurrent Neural Networks
|
Emergent Translation in Multi-Agent Communication
|
Deep Canonical Correlation Analysis
|
Emergent Translation in Multi-Agent Communication
|
Multimodal Pivots for Image Caption Translation
|
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing
|
Fast crash recovery in RAMCloud
|
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing
|
Workload analysis of a large-scale key-value store
|
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing
|
Cache craftiness for fast multicore key-value storage
|
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing
|
FlashStore: High Throughput Persistent Key-Value Store
|
SmaRT Visualisation of Legal Rules for Compliance
|
Making Sense of Regulations with SBVR
|
Blockchain Consensus
|
(Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains
|
Blockchain Consensus
|
Implementing fault-tolerant services using the state machine approach: a tutorial
|
Blockchain Consensus
|
Asynchronous byzantine agreement protocols
|
ATM: A distributed, collaborative, scalable system for automated machine learning
|
TPOT: A Tree-Based Pipeline Optimization Tool for Automating Machine Learning
|
ATM: A distributed, collaborative, scalable system for automated machine learning
|
Practical Bayesian Optimization of Machine Learning Algorithms
|
ATM: A distributed, collaborative, scalable system for automated machine learning
|
Metalearning: Applications to Data Mining
|
Light fidelity (Li-Fi): towards all-optical networking
|
Visible light communication using OFDM
|
Light fidelity (Li-Fi): towards all-optical networking
|
Information Rate of OFDM-Based Optical Wireless Communication Systems With Nonlinear Distortion
|
Sentiment analysis of the Uri terror attack using Twitter
|
Baselines and Bigrams: Simple, Good Sentiment and Topic Classification
|
Sentiment analysis of the Uri terror attack using Twitter
|
A predictive model for the temporal dynamics of information diffusion in online social networks
|
Sentiment analysis of the Uri terror attack using Twitter
|
Bad Is Stronger Than Good
|
Improving neural networks by preventing co-adaptation of feature detectors
|
Adaptive Mixtures of Local Experts
|
Improving neural networks by preventing co-adaptation of feature detectors
|
Gradient-Based Learning Applied to Document Recognition
|
Improving neural networks by preventing co-adaptation of feature detectors
|
The Importance of Encoding Versus Training with Sparse Coding and Vector Quantization
|
Improving neural networks by preventing co-adaptation of feature detectors
|
Bagging Predictors
|
Improving neural networks by preventing co-adaptation of feature detectors
|
Training Products of Experts by Minimizing Contrastive Divergence
|
Evolution of evasive malwares: A survey
|
Barecloud: bare-metal analysis-based evasive malware detection
|
Evolution of evasive malwares: A survey
|
Full System Emulation : Achieving Successful Automated Dynamic Analysis of Evasive Malware !
|
Evolution of evasive malwares: A survey
|
SubVirt: implementing malware with virtual machines
|
On the huge benefit of decisive moves in Monte-Carlo Tree Search algorithms
|
Algorithms for Infinitely Many-Armed Bandits
|
High-power density hybrid converter topologies for low-power Dc-Dc SMPS
|
Analysis and Optimization of Switched-Capacitor DC–DC Converters
|
High-power density hybrid converter topologies for low-power Dc-Dc SMPS
|
Switched-capacitor DC-DC converters for low-power on-chip applications
|
A compact printed monopole antenna with symmetrical i and rectangular shaped slots for bluetooth/WLAN/WIMAX applications
|
Compact Multiresonator-Loaded Planar Antenna for Multiband Operation
|
A compact printed monopole antenna with symmetrical i and rectangular shaped slots for bluetooth/WLAN/WIMAX applications
|
Dual-Band Probe-Fed Stacked Patch Antenna for GNSS Applications
|
A compact printed monopole antenna with symmetrical i and rectangular shaped slots for bluetooth/WLAN/WIMAX applications
|
Design of Compact F-Shaped Slot Triple-Band Antenna for WLAN/WiMAX Applications
|
DLMS/COSEM security level enhancement to construct secure advanced metering infrastructure
|
Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities
|
Subsets and Splits
SQL Console for sentence-transformers/specter
Counts the number of unique anchors in the triplet dataset, providing a basic overview of the diversity of anchors.