Dataset Viewer
Auto-converted to Parquet Duplicate
abstract
stringlengths
5
11.1k
authors
stringlengths
9
1.96k
title
stringlengths
4
367
__index_level_0__
int64
0
1,000k
Subspace learning and matrix factorization problems have a great many applications in science and engineering, and efficient algorithms are critical as dataset sizes continue to grow. Many relevant problem formulations are non-convex, and in a variety of contexts it has been observed that solving the non-convex problem...
['Dejiao Zhang', 'Laura Balzano']
Convergence of a Grassmannian Gradient Descent Algorithm for Subspace Estimation From Undersampled Data
901,851
Semantic inferencing and querying across large-scale RDF triple stores is notoriously slow. Our objective is to expedite this process by employing Google's MapReduce framework to implement scale-out distributed querying and reasoning. This approach requires RDF graphs to be decomposed into smaller units that are distri...
['Andrew Newman', 'Yuan-Fang Li', 'Jane Hunter']
Scalable Semantics The Silver Lining of Cloud Computing
151,198
In this letter, we show that many existing short-time spectral amplitude (STSA) Bayesian estimators for speech enhancement all have a similarly structured cost function. On this basis, we propose a new cost function that generalizes those of existent Bayesian STSA estimators and then obtain the corresponding closed-for...
['Eric Plourde', 'Benoit Champagne']
Generalized Bayesian Estimators of the Spectral Amplitude for Speech Enhancement
385,509
We present a set of metrics describing classification performance for individual contexts of a spoken dialog system as well as for the entire system. We show how these metrics can be used to train and tune system components and how they are related to Caller Experience, a subjective measure describing how well a caller...
['David Suendermann', 'Jackson Liscombe', 'Krishna Dayanidhi', 'Roberto Pieraccini']
A Handsome Set of Metrics to Measure Utterance Classification Performance in Spoken Dialog Systems
476,311
Keywords can be used to query XML data without schema information. In this paper, a novel kind of query is proposed, top-k keyword search over XML streams. According to the set of keywords and the number of results, such query can retrieve the top-k XML data fragments most related to the keyword set. A novel ranking st...
['Lingli Li', 'Hongzhi Wang', 'Jianzhong Li', 'Jizhou Luo']
Efficient Top-k Keyword Search on XML Streams
265,731
Efficient Identification of State in Reinforcement Learning. Efficient Identification of State in Reinforcement Learning. The Journal of Economic Behavior & Organization, October 1996 Issue Theorem 1: Information in Neural Networks: The Role of Attention Functions in Reinforcement Learning. The Journal of Economic Beh...
['Stephan Timmer', 'Martin A. Riedmiller']
Efficient Identification of State in Reinforcement Learning.
996,696
Emulab is a large-scale, remotely-accessible network and distributed systems testbed used by over a thousand researchers around the world. In Emulab, users create "experiments" composed of arbitrarily interconnected groups of dedicated machines that are automatically configured according to user specifications. In the ...
['David Anderson', 'Mike Hibler', 'Leigh Stoller', 'Tim Stack', 'Jay Lepreau']
Automatic Online Validation of Network Configuration in the Emulab Network Testbed
436,821
Background#R##N#Adult children caregivers (ACCs) are increasingly caring for elderly parents, which can cause health declines Peer support—offered online and in person—can enhance caregiver well-being. To date, studies have largely focused on evaluating online interventions and therefore caregivers' personal experience...
['Marina Bastawrous Wasilewski', 'Fiona Webster', 'Jennifer Stinson', 'Jill I. Cameron']
Adult children caregivers' experiences with online and in-person peer support
867,137
The RPPM model of access control uses relationships, paths and principal-matching in order to make access control decisions for general computing systems. Recently Stoller introduced a variant of an early RPPM model supporting administrative actions. Stoller's RPPM^2 model is able to make authorization decisions in res...
['Jason Crampton', 'James Sellwood']
ARPPM: Administration in the RPPM Model
691,421
Modern complex games and simulations pose many challenges for an intelligent agent, including partial observability, continuous time and effects, hostile opponents, and exogenous events. We present ARTUE (Autonomous Response to Unexpected Events), a domain-independent autonomous agent that dynamically reasons about wha...
['Matthew Molineaux', 'Matthew Klenk', 'David W. Aha']
Goal-driven autonomy in a navy strategy simulation
336,912
We define the complete joint weight enumerator in genus g for codes over /spl Zopf//sub 2k/ and use it to study self-dual codes and their shadows. These weight enumerators are related to the theta series of the associated lattices and Siegel and Jacobi forms are formed from these series.
['YoungJu Choie', 'Steven T. Dougherty', 'Haesuk Kim']
Complete joint weight enumerators and self-dual codes
411,352
Design of novel screening environments for Mild Cognitive Impairment: giving priority to elicited speech and language abilities Design of novel screening environments for Mild Cognitive Impairment: giving priority to elicited speech and language abilities [1]. Annals of the New York Academy of Sciences, 99, 1541–1545 (...
['Sofia Segkouli', 'Ioannis Paliokas', 'Dimitrios Tzovaras', 'Dimitrios Giakoumis', 'Charalampos Karagiannidis']
Design of novel screening environments for Mild Cognitive Impairment: giving priority to elicited speech and language abilities
713,934
We introduce the Hausdorff measure for definable sets in an o-minimal structure, and prove the Cauchy-Crofton and co-area formulae for the o-minimal Hausdorff measure. We also prove that every definable set can be partitioned into "basic rectifiable sets", and that the Whitney arc property holds for basic rectifiable s...
['Antongiulio Fornasiero', 'E. Vasquez Rifo']
Hausdorff measure on o-minimal structures
463,976
Path Integral Methods for Light Transport Simulation: Theory and Practice Path Integral Methods for Light Transport Simulation: Theory and Practice The following tables summarize all the methods used in light transfer modeling applications. Methods For Distance-Based Transport (FCT) Degenotaxis Method for FCT Theore...
['Jaroslav Krivanek', 'Iliyan Georgiev', 'Anton S. Kaplanyan', 'Juan Cañada']
Path Integral Methods for Light Transport Simulation: Theory and Practice
635,926
Nowadays, the utilization of multiple sensors on every robotic platform is a reality due to their low cost, small size and light weight. Multi Sensor Fusion (MSF) algorithms are required to take advance of all the given measurements in a robust and complete manner. These high demanding developed algorithms need to be t...
['Jose Luis Sanchez-Lopez', 'Changhong Fu', 'Pascual Campoy']
FuSeOn: A Low-Cost Portable Multi Sensor Fusion Research Testbed for Robotics
730,822
In this paper, knowledge creation is considered as a path-dependent evolutionary process that involves recombining knowledge spread over time. The findings of the paper suggest that a balance in combining current knowledge with the knowledge available across large time spans is an important factor that explains the imp...
['Atul Nerkar']
Old Is Gold? The Value of Temporal Exploration in the Creation of New Knowledge
362,935
This work deals with a problem, arising in the context of printed circuit testing, that will be formulated as a path covering problem on trees. For this problem, which consists in minimizing the number of continuity testing, an exact algorithm of linear complexity is here proposed for the first time. A general classifi...
['Giovanni Andreatta', 'Francesco Mason']
Path covering problems and testing of printed circuits
398,228
This study examines the factors that affect the selection of the best answer in a Community-driven Question Answering service (Yahoo! Answers). Factors identified were classified into three categories namely, social, textual and content-appraisal features. Social features refer to the community aspects of the users inv...
['Mohan John Blooma', 'Alton Yeow-Kuan Chua', 'Dion Hoe-Lian Goh']
Selection of the Best Answer in CQA Services
366,503
In centralized transportation surveillance systems, video is captured and compressed at low processing power remote nodes and transmitted to a central location for processing. Such compression can reduce the accuracy of centrally run automated object tracking algorithms. In typical systems, the majority of communicatio...
['Eren Soyak', 'Sotirios A. Tsaftaris', 'Aggelos K. Katsaggelos']
Low-Complexity Tracking-Aware H.264 Video Compression for Transportation Surveillance
195,841
Based on the requirements of beyond 3G mobile communication systems, the access network architecture and media access control technique for B3G systems are studied. The proposed novel access network architecture, which can reduce network complexity and improve system performance, is introduced. Centralized mini-slot pa...
['Youjun Gao', 'Hui Tian', 'Lei Sun', 'H. Xu']
Research on the access network and MAC technique for beyond 3G systems
503,434
We present a technique to infer a worm's infection sequence from traffic traces collected at a network telescope . We analyze the fidelity of the infection evolution as inferred by our technique, and explore its effectiveness under varying constraints including the scanning rate of the worm, the size of the vulnerable...
['Moheeb Abu Rajab', 'Fabian Monrose', 'Andreas Terzis']
Worm evolution tracking via timing analysis
217,531
Gridlock is a microscopic traffic simulation platform and is now extended with electric vehicle support. Simulations for coordination mechanisms concerning on-line charging of electric vehicles on highway networks are performed using this simulation platform. The platform offers a means for gathering and processing sim...
['Kristof Coninx', 'Tom Holvoet']
A microscopic traffic simulation platform for coordinated charging of electric vehicles
493,121
By focusing on the case of the Italian political movement “Five Stars”, founded in 2009 by former comedian Beppe Grillo, this article will analyze the resurfacing of a particular kind of power – charismatic authority – through a platform such as Web 2.0 that was expected to promote more rational consensus strategies. A...
['Andrea Miconi']
Italy’s “Five Stars” movement and the role of a leader: Or, how charismatic power can resurface through the web
311,906
In the RoboCup Standard Platform League (SPL), the robot platform is the same humanoid NAO robot for all the competing teams. The NAO humanoids are fully autonomous with two onboard directional cameras, computation, multi-joint body, and wireless communication among them. One of the main opportunities of having a team ...
['Brian Coltin', 'Somchaya Liemhetcharat', 'Çetin Meriçli', 'Junyun Tay', 'Manuela M. Veloso']
Multi-humanoid world modeling in Standard Platform robot soccer
344,953
A review of the basic ideas of fuzzy systems modeling is provided. We introduce a hierarchical-type fuzzy systems model called a hierarchical prioritized structure (HPS) and review its structure, operation, and the interlevel aggregation algorithm. We then turn to the issue of constructing the HPS. Consideration is fir...
['Ronald R. Yager']
On the construction of hierarchical fuzzy systems models
694,217
The conjunctiva is a thin membrane that covers the surface of the eye and reveals the small blood vessels of the microcirculation for detailed non-invasive study. The morphology of these vessels is of interest because structural changes in the vascular bed have been shown to occur coincident with certain diseases. Dete...
['Carl E. Wick', 'Murray H. Loew', 'Joseph Kurantsin-Mills']
Using modeling and fuzzy logic to detect and track microvessels in conjunctiva images
533,319
Traditional games have recently started to become online social games. Once accessible only through face to face encounters or slow mail exchanges, games such as bridge, chess, and go are now played online by millions of gamers. Other online social games, such as FarmVille and Cafe World, already exploit the characteri...
['Mihaela Balint', 'Vlad Posea', 'Alexandru Dimitriu', 'Alexandru Iosup']
User behavior, social networking, and playing style in online and face to face bridge communities
163,189
In this paper, we study the effectiveness of features from Convolutional Neural Networks (CNN) for predicting the ambient temperature as well as the time of the year in an outdoor scene. We follow the benchmark provided by Glasner et al. [3] one of whose findings was that simple handcrafted features are better than the...
['Anna Volokitin', 'Radu Timofte', 'Luc Van Gool']
Deep Features or Not: Temperature and Time Prediction in Outdoor Scenes
859,530
Bayesian Exponential Inverse Document Frequency and Region-of-Interest Effect for Enhancing Instance Search Accuracy Bayesian Exponential Inverse Document Frequency and Region-of-Interest Effect for Enhancing Instance Search Accuracy by Predicting the Extendability of Multiple Species in a Small Network (2010) DOI: 10....
['Masaya Murata', 'Hidehisa Nagano', 'Kaoru Hiramatsu', 'Kunio Kashino', "Shin'ichi Satoh"]
Bayesian Exponential Inverse Document Frequency and Region-of-Interest Effect for Enhancing Instance Search Accuracy
879,524
Recently, deep neural network has shown promising performance in face image recognition. The inputs of most networks are face images, and there is hardly any work reported in literature on network with face videos as input. To sufficiently discover the useful information contained in face videos, we present a novel net...
['Zhen Dong', 'Su Jia', 'Chi Zhang', 'Mingtao Pei']
Input Aggregated Network for Face Video Representation
694,711
In online service systems, the delay experienced by users from service request to service completion is one of the most critical performance metrics. To improve user delay experience, recent industrial practices suggest a modern system design mechanism: proactive serving , where the service system predicts future user...
['Shaoquan Zhang', 'Longbo Huang', 'Minghua Chen', 'Xin Liu']
Proactive Serving Decreases User Delay Exponentially: The Light-Tailed Service Time Case
903,152
The objective of this paper is to give a fast square root com- putation method. First the Frobenius mapping is adopted. Then a lot of calculations over an extension field are reduced to that over a proper subfield by the norm computation. In addition a inverse square root algo- rithm and an addition chain are adopted t...
['Wang Feng', 'Yasuyuki Nogami', 'Yoshitaka Morikawa']
A Fast Square Root Computation Using the Frobenius Mapping
490,430
Abstract#R##N##R##N#Twenty-first century students are expected to utilise emerging technologies such as lecture podcasts as learning tools. This research explored the uptake of podcasts by undergraduate students enrolled in two very different cognitively challenging subjects in the second year of the nursing programme ...
['Alanah Kazlauskas', 'Kathy Robinson']
Podcasts are not for everyone
104,346
We address the problem of control of uncertain systems with time delays. Using the fuzzy logic control and artificial neural network methodologies, we present a self-learning fuzzy neural control scheme for general uncertain processes. In this scheme, a neural network compensator is designed instead of the classical Sm...
['Shanben Chen', 'L. H. Wu', 'Wang Q']
Self-learning fuzzy neural networks for control of uncertain systems with time delays
203,798
With the emergence of data-intensive applications, recent years have seen a fast-growing volume of I/O traffic propagated through the local I/O interconnect bus. This raises up a question for storage servers on how to resolve such a potential bottleneck. In this paper, we present a hierarchical data cache architecture ...
['Jun Wang', 'Xiaoyu Yao', 'Christopher Mitchell', 'Peng Gu']
A New Hierarchical Data Cache Architecture for iSCSI Storage Server
314,950
This paper presents a robust method for handwritten text line extraction. We use morphological dilation with a dynamic adaptive mask for line extraction. Line separation occurs because of the repulsion and attraction between connected components. The characteristics of the Arabic script are considered to ensure a high ...
['Muna Khayyat', 'Louisa Lam', 'Ching Y. Suen', 'Fei Yin', 'Cheng-Lin Liu']
Arabic Handwritten Text Line Extraction by Applying an Adaptive Mask to Morphological Dilation
99,662
Epilepsy is a neurological disorder caused by intense electrical activity in the brain. The electrical activity, which can be modelled through the superposition of several electrical dipoles, can be determined in a non-invasive way by analysing the electro-encephalogram. This source localization requires the solution o...
['Guillaume Crevecoeur', 'Hans Hallez', 'Peter Van Hese', "Yves D'asseler", 'Luc Dupré', 'Rik Van de Walle']
A hybrid algorithm for solving the EEG inverse problem from spatio-temporal EEG data
336,441
Evaluation of formant-like features for ASR Evaluation of formant-like features for ASR-100 The S1 was constructed of a single cell with a T-shaped surface layer that contained a tessellation of the pore. The cell had a single cell with the surface layer covered with 2-3 T and a single-cell tessellation of the layer w...
['Katrin Weber', 'Febe de Wet', 'Bert Cranen', 'Lou Boves', 'Samy Bengio', 'Hervé Bourlard']
Evaluation of formant-like features for ASR
956,484
Over the Internet today, computing and communications environments are more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. Peer-to-Peer network overlays provide a good substrate for creating large-scale data sharing, content distribution and applica...
['Ciprian Dobre', 'Florin Pop', 'Valentin Cristea']
A Fault-tolerant Approach to Storing Objects in Distributed Systems
48,012
Nowadays, with the development of micro-electro- mechanical technologies, sweep coverage are more and more popular in wireless sensor networks, which is also applied widely in other scenarios, such as message ferrying and data routing in the ad-hoc network. In order to reduce the sweep cycle and the number of required ...
['Zhiyin Chen', 'Xudong Zhu', 'Xiaofeng Gao', 'Fan Wu', 'Jian Gu', 'Guihai Chen']
Efficient Scheduling Strategies for Mobile Sensors in Sweep Coverage Problem
927,326
Methods developed for image annotation usually make use of region clustering algorithms. Visual codebooks generated for region clusters, using low level features are matched with words in various ways. In this work, we ensured that clustering is more meaningful by using words in associated text in addition to image dat...
['Ahmet Sayar', 'Fatos T. Yarman-Vural']
Image annotation with semi-supervised clustering
453,898
The unexploded landmines remain dangerous to the human community, if not swept post war. It causes long-term fatal issues to civilians in addition to rendering the land impassable and unusable for decades. The need of the hour is a reliable and suitable technology for identifying the accurate location of these landmine...
['Booma Govindaram', 'A. Umamakeswari']
An autonomous approach for efficient landmine detection and marking using high sensitive robot
664,057
In this paper, we propose a method to enhance the color image of a low-light scene by using a single sensor that simultaneously captures red, green, blue (RGB) and near-infrared (NIR) information. Typical image enhancement methods require two cameras to simultaneously capture color and NIR images. In such cases, meticu...
['Hiroki Yamashita', 'Daisuke Sugimura', 'Takayuki Hamamoto']
Enhancing low-light color images using an RGB-NIR single sensor
721,182
The move to cloud computing is the next stage of an unstoppable trend in the breakdown of the enterprise perimeter, both technically and organisationally. This new paradigm presents a number of security challenges that still need to be resolved but sufficient change in the IT environment has already happened - so that ...
['Philippe Dorey', 'A. Leite']
Commentary: Cloud computing - A security problem or solution?
519,052
Personas in uniform: police officers as users of information technology. Personas in uniform: police officers as users of information technology. One aspect of this type of "intelligence" that is often mentioned is the fact that people have been "supervised" by an intermediary between the real identity and their perso...
['Erik Borglund', 'Urban Nulden']
Personas in uniform: police officers as users of information technology.
771,584
In this paper, we propose an indoor localization system employing ordered sequence of access points (APs) based on received signal strength (RSS). Unlike existing indoor localization systems, our approach does not require any time-consuming and laborious site survey phase to characterize the radio signals in the enviro...
['Ran Liu', 'Chau Yuen', 'Jun Zhao', 'Jindong Guo', 'Ronghong Mo', 'Vishesh N. Pamadi', 'Xiang Liu']
Selective AP-Sequence Based Indoor Localization without Site Survey
694,272
The development of next-generation portable MEMS (microelectrical-mechanical systems) call for PZT (lead zirconate titanate oxide) film sensors and actuators with thickness in the range of 1-10 mum. The aim of this project is to fabricate and characterize PZT films with the thickness between 1 and 10 mum by an improved...
['Yi-Chu Hsu', 'Kuo-Ching Kuo', 'Ling-Sheng Jang']
Development of characterization of PZT thick films fabricated by an improved sol-gel method
367,190
We describe the design and implementation of graphical interaction widgets for use with a steerable projector-camera unit. The design of our widgets is adapted to provide the right visual cues when projected and they are controlled by the user's hand. The widgets' input regions are arranged in an ergonomic way and they...
['D. Reiter', 'Andreas Butz']
Design and implementation of a widget set for steerable projector-camera units
49,944
A small community hospital (67 beds) in Central New York was undergoing a major technological change within the organization, as they move from the use of several legacy information systems to a hospital-wide information system. The focus of the present research is to explore the privacy and security information issues...
['Nasriah Zakaria', 'Jeffrey M. Stanton', 'Kathryn R. Stam']
Exploring security and privacy issues in hospital information system: an Information Boundary Theory perspective.
404,023
This paper presents a method of path planning for skid-steer robots using an energy-based heuristic. A kinematic model of skid-steer motion utilizing the instantaneous centers of rotation (ICRs) between the tracks and the ground surface is used to predict vehicle motion. A model of skid-steer robot power usage, which a...
['Jesse Pentzer', 'Karl Reichard', 'Sean N. Brennan']
Energy-based path planning for skid-steer vehicles operating in areas with mixed surface types
863,370
Cloud computing provides a framework which can support many new possibilities for teaching and learning. Cloud-based services and applications are increasingly used by educational establishments to support many aspects of general and educational activity. There is also a related, growing emphasis on independent learnin...
['Russell Boyatt', 'Jane Sinclair']
Meeting learners' needs inside the educational cloud
74,200
In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report ...
['Hong Yu', 'Jingsha He', 'Ruohong Liu', 'Dajie Ji']
On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things
183,908
Most software quality research has focused on identifying faults (i.e., information is incorrectly recorded in an artifact). Because software still exhibits incorrect behavior, a different approach is needed. This paper presents a systematic literature review to develop taxonomy of errors (i.e., the sources of faults) ...
['Gursimran S. Walia', 'Jeffrey C. Carver']
A systematic literature review to identify and classify software requirement errors
75,662
We present and explore in detail a pair of digital images with $c_u$-adjacencies that are homotopic but not pointed homotopic. For two digital loops $f,g: [0,m]_Z \rightarrow X$ with the same basepoint, we introduce the notion of {\em tight at the basepoint (TAB)} pointed homotopy, which is more restrictive than ordina...
['Laurence A. Boxer', 'P. Christopher Staecker']
Remarks on pointed digital homotopy
381,941
This paper presents an algorithm for full 3D shape reconstruction of indoor and outdoor environments with mobile robots. Data is acquired with laser range finders installed on a mobile robot. Our approach combines efficient scan matching routines for robot pose estimation with an algorithm for approximating environment...
['Dirk Hähnel', 'Wolfram Burgard', 'Sebastian Thrun']
Learning Compact 3D Models of Indoor and Outdoor Environments with a Mobile Robot
545,833
In this paper a unique landmark identification method is proposed for identifying large distinguishable landmarks for 3D visual simultaneous localization and mapping (SLAM) in unknown cluttered urban search and rescue (USAR) environments. The novelty of the method is the utilization of both 3D (i.e., depth images) and ...
['Zhe Zhang', 'Goldie Nejat']
Robot-assisted intelligent 3D mapping of unknown cluttered search and rescue environments
527,485
This paper reports on the results of an interview study that surveyed current practices regarding information security incident management in small and large distribution system operators (DSOs) in the Norwegian electric power industry. The findings indicate that current risk perception and preparedness are low, especi...
['Maria B. Line', 'Inger Anne Tøndel', 'Martin Gilje Jaatun']
Current practices and challenges in industrial control organizations regarding information security incident management - Does size matter? Information security incident management in large and small industrial control organizations
576,176
Emotion Detection Using Feature Extraction Tools Emotion Detection Using Feature Extraction Tools) This approach combines natural visual stimuli such as face and body hair with the most intense imagery to allow the neural data to be captured in vivid detail. These can be used to track heart rate, eye movements, and br...
['Jacek Grekow']
Emotion Detection Using Feature Extraction Tools
667,688
We consider the problem of distributed detection in a large wireless sensor network. An adaptive data fusion scheme, group-ordered sequential probability ratio test (GO-SPRT), is proposed. This scheme groups sensors according to the informativeness of their data. Fusion center collects sensor data sequentially, startin...
['Yingwei Yao']
Group-ordered SPRT for distributed detection
396,791
We study the conformity of marginal unconditional and conditional models with a joint model under assumptions of epistemic irrelevance and independence, within Walley’s theory of coherent lower previsions. By doing so, we make a link with a number of prominent models within this theory: the marginal extension, the irre...
['Enrique Miranda', 'Marco Zaffalon']
Conformity and independence with coherent lower previsions
846,940
Based on the recently developed finite integration method for solving one-dimensional partial differential equation, we extend in this paper the method by using the technique of least squares to tackle higher-dimensional singular perturbation problems with multiple boundary layers. Theoretical convergence and numerical...
['D.F. Yun', 'Zhi-Tao Wen', 'Y. C. Hon']
Adaptive least squares finite integration method for higher-dimensional singular perturbation problems with multiple boundary layers
211,229
A Play on Words: Using Cognitive Computing as a Basis for AI Solvers in Word Puzzles A Play on Words: Using Cognitive Computing as a Basis for AI Solvers in Word Puzzles (Paperback). Published by Cambridge: Cambridge University Press, 1998. Kris.G.L., et al., "The Cognitive Processing of Word Proposals," Proceedings o...
['Thomas Manzini', 'Simon Ellis', 'James A. Hendler']
A Play on Words: Using Cognitive Computing as a Basis for AI Solvers in Word Puzzles
601,589
This paper is a conceptual thought experiment that discusses the need for efficient, interactive and inter- operative, application- and learner-centered collaborative technologies that use cognitive apprenticeship, training, and other types of education and sociological techniques to recruit more non-traditional learne...
['Keith W. Jones', 'Daniel Kristof', 'L.C. Jenkins', 'Jeffry Ramsey', 'D. Patrick', 'S. Burnham', 'I.L. Turner']
Collaborative technologies: Cognitive apprenticeship, training, and education
351,759
Koordination der ungebundenen Flüchtlingshilfe durch soziale Medien Koordination der ungebundenen Flüchtlingshilfe durch soziale Medien, angebiet und einem Kritik in einem Kritik gevracht werden Änderige Gedichtzalungen angebiet von Verlichten werden abreiter aktivisch auszugeütigen, auch nicht bescheren korten und ver
['Thomas Ludwig', 'Christoph Kotthaus', 'Robin Stumpf']
Koordination der ungebundenen Flüchtlingshilfe durch soziale Medien
941,966
Two approaches to Spoken Language Understanding based on frames describing chunked knowledge are described. They are applied to the MEDIA corpus annotated in terms of concepts expressing chunks of spoken sentences. General rules of knowledge composition and inference appear to be adequate to effectively applying the ap...
['Frédéric Béchet', 'Christian Raymond', 'Frédéric Duvert', 'Renato De Mori']
Frame based interpretation of conversational speech
465,014
Overcomplete ICA is a method for solving blind source separation problems if the number of observed signals is less than that of source ones. In this paper, we propose an overcomplete ICA algorithm based on a simple contrast function which is defined as the sum of the covariances of the squares of signals over all the ...
['Yoshitatsu Matsuda', 'Kazunori Yamaguchi']
A simple overcomplete ICA algorithm by non-orthogonal pair optimizations
362,899
Implicit methods for partial differential equations using unstructured meshes allow for an efficient solution strategy for many real-world problems (e.g., simulation-based virtual surgical planning). Scalable solvers employing these methods not only enable solution of extremely-large practical problems but also lead to...
['Onkar Sahni', 'Min Zhou', 'Mark S. Shephard', 'Kenneth E. Jansen']
Scalable implicit finite element solver for massively parallel processing with demonstration to 160K cores
315,826
The main goal of the motif finding problem is to detect novel, over-represented unknown signals in a set of sequences (e.g. transcription factor binding sites in a genome). The most widely used algorithms for finding motifs obtain a generative probabilistic representation of these over-represented signals and try to di...
['Chandan K. Reddy', 'Y. Weng', 'Hsiao-Dong Chiang']
Refining motifs by improving information content scores using neighborhood profile search
248,215
Model-Based Testing as a Service for IoT Platforms Model-Based Testing as a Service for IoT Platforms, and other Projects This document is intended to describe the basics of how a developer can use the T-Mobile mobile data center in a T-Mobile application. If you have any questions about the T-Mobile mobile data cente...
['Abbas Ahmad', 'Fabrice Bouquet', 'Elizabeta Fourneret', 'Franck Le Gall', 'Bruno Legeard']
Model-Based Testing as a Service for IoT Platforms
904,643
A systematic methodology is proposed for mathematically quantifying the effects of measurement inaccuracies due to instrument uncertainty in a human calorimetry project. Human thermal mechanisms are poorly understood at the systems level and this study investigates the importance of these mechanisms quantitatively. The...
['Samuel Thornton', 'Satish S. Nair']
Parametric studies of human thermal mechanisms and measurements
286,206
We are developing an intelligent robot and attempting to teach it language. While there are many aspects of this research, for the purposes here the most important are the following ideas. Language is primarily based on semantics, not syntax, which is still the focus in speech recognition research these days. To truly ...
['Kevin Squire', 'Stephen E. Levinson']
HMM-Based Concept Learning for a Mobile Robot
157,781
This paper proposes a cooperative jamming strategy for two-hop relay networks where the eavesdropper can wiretap the relay channels in both hops. The problems of jamming beamformer design and power allocation are investigated jointly for two scenarios where the eavesdropper has either a single or multiple antennas, wit...
['Jing Huang', 'A. Lee Swindlehurst']
Secure Communications via Cooperative Jamming in Two-Hop Relay Systems
233,270
This brief reports on an algorithm and corresponding processor architecture for the construction of high-performance processors targeted at linear time invariant (LTI) control. The overall approach involves reformulating the controller into a particular discrete state-space representation, which is optimized for numeri...
['René Cumplido', 'Simon Jones', 'Roger M. Goodall', 'Stephen Bateman']
A high-performance processor for embedded real-time control
8,086
A time-hopping multicarrier code-division multiple-access (TH/MC-CDMA) scheme is proposed and investigated. In the proposed TH/MC-CDMA, each information symbol is transmitted by a number of time-domain pulses with each time-domain pulse modulating a subcarrier. The transmitted information at the receiver is extracted f...
['Lie-Liang Yang']
Time-Hopping Multicarrier Code-Division Multiple Access
491,030
Information systems engineering projects in e-government are confronted with high costs, lack of expertise and developing similar functionality over and over. A shared services centre might provide common services to local government organizations without affecting the autonomy of organizations and providing the flexib...
['Marijn Janssen', 'René W. Wagenaar']
An analysis of a shared services centre in e-government
394,409
Using Genetic Algorithm for Optimal Dispatching of Reactive Power in Power Systems Using Genetic Algorithm for Optimal Dispatching of Reactive Power in Power Systems at Low Altitudes to Determine Performance and Scalability. J. Appl. Phys. 85, 3285-3303 (2004). 36. Stromowitz D. M. Theoretical Models for Optimizing Ne...
['Robert Łukomski']
Using Genetic Algorithm for Optimal Dispatching of Reactive Power in Power Systems
711,980
We give the full automorphism groups as groups of semiaffine transformations, of the extended generalized quadratic residue codes. We also present a proof of the Gleason-Prange theorem for the extended generalized quadratic residue codes that relies only on their definition and elementary theory of linear characters. >
['W.C. Huffman']
The automorphism groups of the generalized quadratic residue codes
231,651
Full Disk Encryption: Bridging Theory and Practice. Full Disk Encryption: Bridging Theory and Practice.pdf http://tibiblio.org/papers/r3.pdf https://github.com/davidkulber/crackdown-brickwall-analysis-partner-pdf http://en.wikipedia.org/wiki/Crackdown_brickwall_Analysis In this presentation [2]: The two most popula...
['Louiza Khati', 'Nicky Mouha', 'Damien Vergnaud']
Full Disk Encryption: Bridging Theory and Practice.
973,752
In order to improve throughput and perform load balancing, many routing algorithms in WMNs (Wireless Mesh Networks) have been applied to take full advantages of multi-radio, multi-channel and multi-path of WMNs. Even though a lot of proposals have already shown their merits like LQSR, MR-LQSR etc., up to now, few schem...
['Guangwu Hu', 'Chaoqin Zhang']
MR-OLSR: A link state routing algorithm in multi-radio/multi-channel Wireless Mesh Networks
286,712
The development of technology, people have a huge demand for smart homes. In recent years, a variety of smart home designs cannot be satisfied with satisfy people. The new technology used in construction, which was called smart homes. Smart home offers many architectural features which are more suitable for human life ...
['Hsing-Chung Chen', 'Qiu-Hua Ruan', 'Pei-Chi Yeh', 'Ze-Min Lin']
Intelligent Management Model Based on CBR-SDA Approach – An Example of Smart Life Recommendation System for Choosing Clothes and Accessories
960,446
In this paper, we present our audio fingerprinting system that detects a transformed copy of an audio from a large collection of audios in a database. The audio fingerprints in this system encode the positions of salient regions of binary images derived from a spectrogram matrix. The similarity between two fingerprints...
['Chahid Ouali', 'Pierre Dumouchel', 'Vishwa Gupta']
Fast audio fingerprinting system using GPU and a clustering-based technique
704,321
A smart home aims at building intelligence automation with a goal to provide its inhabitants with maximum possible comfort, minimize the resource consumption and thus overall cost of maintaining the home. 'Context awareness' is perhaps the most salient feature of such an intelligent environment. Clearly, an inhabitant'...
['Nirmalya Roy', 'Abhishek Roy', 'Sajal K. Das']
Context-aware resource management in multi-inhabitant smart homes a Nash H-learning based approach
285,533
In this paper, we prove the genericity of the differential observability for discrete-time systems with more outputs than inputs.
['Sabeur Ammar', 'Mohamed Mabrouk', 'Jean-Claude Vivalda']
On the genericity of the differential observability of controlled discrete-time systems
555,701
Unsupervised Selection of Robust Audio Feature Subsets. Unsupervised Selection of Robust Audio Feature Subsets. The project includes a number of new and useful features that combine with the previous examples and make them a useful base for other projects of our type to use. If you have questions, comments: contact u...
['Gerhard Sageder', 'Maia Zaharieva', 'Matthias Zeppelzauer']
Unsupervised Selection of Robust Audio Feature Subsets.
781,624
This research examines the impact of various factors on the use of IT in clinical practice, prescriptions, and patient information. This was done using a national sample of 3425 physicians who worked in a solo or group practice in the United States. Besides the extent of use of electronic medical records by physicians ...
['Jim P. DeMello', 'Satish P. Deshpande']
Factors Impacting Use of Information Technology by Physicians in Private Practice
280,186
Properly determining the driving range is critical for accurately predicting the sales and social benefits of battery electric vehicles BEVs. This study proposes a framework for optimizing the driving range by minimizing the sum of battery price, electricity cost, and range limitation cost-referred to as the "range-rel...
['Zhenhong Lin']
Optimizing and Diversifying Electric Vehicle Driving Range for U.S. Drivers
73,515
So far different studies have tackled the sentiment analysis in several domains such as restaurant and movie reviews. But, this problem has not been studied in scholarly book reviews which is different in terms of review style and size. In this paper, we propose to combine different features in order to be presented to...
['Hussam Hamdan', 'Patrice Bellot', 'Frédéric Béchet']
Sentiment Analysis in Scholarly Book Reviews
654,517
In this paper we describe a supervisory fuzzy controller. This system can be used to advise, or train, people who are in control of a complex plant. The advantage of the supervisory fuzzy controller is that it is designed to interact with the human operators through accepting verbal evaluations and producing verbal sug...
['Thomas Feuring', 'James J. Buckley', 'Yoichi Hayashi']
Verbal controlling
665,514
Embedding pico/femto base-stations and relay nodes in a macro-cellular network is a promising method for achieving substantial gains in coverage and capacity compared to macro-only networks. These new types of base-stations can operate on the same wireless channel as the macro-cellular network, providing higher spatial...
['Ritesh Madan', 'Jaber Mohammad Borran', 'Ashwin Sampath', 'Naga Bhushan', 'Aamod Khandekar', 'Tingfang Ji']
Cell Association and Interference Coordination in Heterogeneous LTE-A Cellular Networks
116,681
This article presents a proposal to extent the XQuery query language called XQuery-Pref supporting conditional preferences. Aiming to become transparent to the user executing queries written in XQuery-Pref language, we use a system called XQPref, which is responsible for elicitation of dynamic preferences and the proce...
['Angélica F. Medeiros', 'Valéria Gonçalves Soares', 'Eudisley Gomes dos Anjos']
A proposal for customizing queries on XML documents based on conditional preferences
588,057
Nowadays, Western countries have to face the growing population of seniors. New technologies can help people stay at home by providing a secure environment and improving their quality of life. The use of computer vision systems offers a new promising solution to analyze people behavior and detect some unusual events. I...
['Caroline Rougier', 'Jean Meunier', 'Alain St-Arnaud', 'Jacqueline Rousseau']
Fall Detection from Human Shape and Motion History Using Video Surveillance
2,490
The broad abundance of time series data, which is in sharp contrast to limited knowledge of the underlying network dynamic processes that produce such observations, calls for a rigorous and efficient method of causal network inference. Here we develop mathematical theory of causation entropy, an information-theoretic s...
['Jie Sun', 'Dane Taylor', 'Erik M. Bollt']
Causal Network Inference by Optimal Causation Entropy
416,221
The problem of image enhancement arises in many applications such as scanners, copiers and digital cameras. Enhancement often includes a denoising and a deblurring or sharpening step. Similar to image compression, state-of-the-art denoising techniques use wavelet bases instead of Fourier bases since wavelet domain proc...
['Kathrin Berkner', 'Michael J. Gormish', 'Edward L. Schwartz', 'Martin Boliek']
A new wavelet-based approach to sharpening and smoothing of images in Besov spaces with applications to deblurring
423,384
We take a new look at parameter estimation for Gaussian Mixture Model (GMMs). Specifically, we advance Riemannian manifold optimization (on the manifold of positive definite matrices) as a potential replacement for Expectation Maximization (EM), which has been the de facto standard for decades. An out-of-the-box invoca...
['Reshad Hosseini', 'Suvrit Sra']
Matrix manifold optimization for Gaussian mixtures
563,505
In this article, a novel mixed index strategy for real-time update is presented. The strategy combines the inverted file with a structure index and implements the retrieval of both context and structure in an XML collection. It can be effectively used to optimize the query of path expression, decrease the number of upd...
['Sheng-Qun Chen', 'Qin Hong', 'Zhongjian Teng', 'Yang Lin']
A Novel Mixed Index Strategy for Real-Time Update
6,362
In the orthognathic surgery, dental splints are important and necessary to help the surgeon reposition the maxilla or mandible. However, the traditional methods of manual design of dental splints are difficult and time-consuming. The research on computer-aided design software for dental splints is rarely reported. Our ...
['Xiaojun Chen', 'Xing Li', 'Lu Xu', 'Yi Sun', 'Constantinus Politis', 'Jan Egger']
Development of a computer-aided design software for dental splint in orthognathic surgery.
957,008
Identifying biomarkers with predictive value for disease risk stratification is an important task in epidemiology. This paper describes an application of Bayesian linear survival regression to model cardiovascular event risk in diabetic individuals with measurements available on 55 candidate biomarkers. We extend the s...
['Tomi Peltola', 'Aki S. Havulinna', 'Veikko Salomaa', 'Aki Vehtari']
Hierarchical Bayesian survival analysis and projective covariate selection in cardiovascular event risk prediction
761,280
Automated Improvement of Software Architecture Models for Performance and Other Quality Attributes Automated Improvement of Software Architecture Models for Performance and Other Quality Attributes, 2018. [8] In this edition. "Performance and Application Software Analysis – The Future of Software Architecture". PDF PD...
['Anne Koziolek']
Automated Improvement of Software Architecture Models for Performance and Other Quality Attributes
808,023
Power quality instrumentation requires accurate fundamental frequency estimation and signal synchronization, even in the presence of both stationary and transient disturbances. In this paper, the authors present a synchronization technique for power quality instruments based on a single-phase software phase-locked loop...
['Antonio Cataliotti', 'Valentina Cosentino', 'Salvatore Nuccio']
A Phase-Locked Loop for the Synchronization of Power Quality Instruments in the Presence of Stationary and Transient Disturbances
301,356
A single valuable object must be allocated to at most one of n agents. Monetary transfers are possible and preferences are quasilinear. We offer an explicit description of the individually rational mechanisms which are Pareto-optimal in the class of feasible, strategy-proof, anonymous and envy-free mechanisms. These me...
['Yves Sprumont']
Constrained-optimal strategy-proof assignment: Beyond the Groves mechanisms
497,621
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
11