Dataset Viewer
Auto-converted to Parquet Duplicate
Search is not available for this dataset
abstract
stringclasses
0 values
embedding
sequence
This paper presents a practical global optimization algorithm for the K-center clustering problem, which aims to select K samples as the cluster centers to minimize the maximum within-cluster distance. This algorithm is based on a reduced-space branch and bound scheme and guarantees convergence to the global optimum ...
[ 0.000402558798668, 0.010741917416453, 0.010650705546140001, -0.008805425837635, 0.0030362932011480004, 0.037130128592252, -0.029159639030694004, 0.000289421353954, -0.023827271535992, -0.037158194929361, 0.006107667461037001, 0.020277036353945, -0.020291067659854, -0.005332369357347, -0....
Visual surveillance aims to perform robust foreground object detection regardless of the time and place. Object detection shows good results using only spatial information, but foreground object detection in visual surveillance requires proper temporal and spatial information processing. In deep learning-based foregr...
[ -0.004978630691766001, 0.017125925049185, 0.010457236319780001, -0.006834174040704, 0.004679349251091001, 0.018844151869416, -0.032082941383123, -0.000666340754833, -0.026998683810234, -0.023421393707394003, 0.034026511013507, 0.031716763973236, -0.004823708441108, 0.018266715109348002, ...
Recognizing an event in an image can be enhanced by detecting relevant objects in two ways: 1) indirectly utilizing object detection information within the unified architecture or 2) directly making use of the object detection output results. We introduce a novel approach, referred to as Doubly-injected Object Detect...
[ -0.03323445469141, 0.017974574118852, 0.007547676097601001, -0.005244297906756, -0.003516764612868, 0.012250405736267001, -0.007136358413845001, -0.013655740767717, -0.020949769765138, -0.0101526863873, 0.018522998318076002, 0.028709961101412003, -0.005151751451194, 0.012462919577956, -0...
This work generalizes graph neural networks (GNNs) beyond those based on the Weisfeiler-Lehman (WL) algorithm, graph Laplacians, and diffusions. Our approach, denoted Relational Pooling (RP), draws from the theory of finite partial exchangeability to provide a framework with maximal representation power for graphs. R...
[ -0.0033673143479970003, 0.024942545220255, 0.016293341293931, -0.017567364498972, -0.01433984003961, -0.004565250128507, -0.009194200858473, -0.0020508235320440002, -0.022507743909955, -0.051272358745336005, 0.0027391500771040004, 0.032671619206666, 0.0009422464063390001, 0.018784765154123...
This paper presents a novel multi-fake evolutionary generative adversarial network(MFEGAN) for handling imbalance hyperspectral image classification. It is an end-to-end approach in which different generative objective losses are considered in the generator network to improve the classification performance of the dis...
[ -0.018717739731073, -0.0021929517388340003, -0.017297867685556002, 0.0023021728266030004, 0.011242930777370002, 0.017803015187382, -0.015031532384455001, -0.013645792379975001, -0.016929246485233, -0.038227330893278004, 0.025311954319477, 0.022103589028120003, 0.007331456057727, 0.00280390...
Cultural adaptation, i.e., the matching of a robot's behaviours to the cultural norms and preferences of its user, is a well known key requirement for the success of any assistive application. However, culture-dependent robot behaviours are often implicitly set by designers, thus not allowing for an easy and automati...
[ -0.010817383415997, -0.015743156895041, 0.004963716492056, -0.016874566674232, 0.010072308592498, 0.013245775364339001, -0.006816055160015001, 0.019220171496272, -0.005008558742702, -0.027885116636753002, -0.012279937975108, -0.0036977790296070004, 0.0021351913455870002, -0.000475588894914...
" Many possible fields of application of robots in real world settings hinge on\nthe ability of rob(...TRUNCATED)
[-0.011579873971641001,-0.004333680029958,0.022429864853620002,-0.018064603209495,-0.005400432273745(...TRUNCATED)
" Orbital angular momentum of light is regarded as a valuable resource in\nquantum technology, espe(...TRUNCATED)
[-0.017170963808894,-0.006853869184851,-0.013707738369703001,-0.002530021360144,-0.00528815947473000(...TRUNCATED)
" Mobile keyboard suggestion is typically regarded as a word-level language\nmodeling problem. Cent(...TRUNCATED)
[-0.028727790340781004,0.018533607944846,0.029536630958318003,-0.026078138500452003,0.01195829082280(...TRUNCATED)
" Deep Neural Networks (DNNs) are known to be vulnerable to the maliciously\ngenerated adversarial (...TRUNCATED)
[0.000783797469921,0.002981959842145,0.01621139422059,-0.025949249044060003,-0.016404222697019,0.015(...TRUNCATED)
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
6