anchor
stringlengths 10
388
| positive
stringlengths 8
386
|
---|---|
Intelligent DSS for talent management: a proposed architecture using knowledge discovery approach | Data mining to improve personnel selection and enhance human capital: A case study in high-technology industry |
Intelligent DSS for talent management: a proposed architecture using knowledge discovery approach | Bankruptcy prediction in banks and firms via statistical and intelligent techniques - A review |
Learning Semantic Hierarchies via Word Embeddings | Learning Syntactic Patterns for Automatic Hypernym Discovery |
Learning Semantic Hierarchies via Word Embeddings | Exploiting Multiple Sources for Open-Domain Hypernym Discovery |
Learning Semantic Hierarchies via Word Embeddings | A Neural Probabilistic Language Model |
Learning Semantic Hierarchies via Word Embeddings | WORDNET: A Lexical Database For English |
Using design thinking to improve psychological interventions: The case of the growth mindset during the transition to high school. | a social - cognitive approach to motivation and personality . |
Using design thinking to improve psychological interventions: The case of the growth mindset during the transition to high school. | Self-theories and goals: their role in motivation, personality, and development. |
Using design thinking to improve psychological interventions: The case of the growth mindset during the transition to high school. | Praise for intelligence can undermine children's motivation and performance. |
Integration of ICT in Education: Key Challenges | Systematic Planning for ICT Integration in Topic Learning |
Parallel Algorithms for Evaluating Centrality Indices in Real-world Networks | Network robustness and fragility: percolation on random graphs. |
Parallel Algorithms for Evaluating Centrality Indices in Real-world Networks | Pajek - Program for Large Network Analysis |
Assessing Test Suite E ↵ ectiveness Using Static Metrics | A Practical Model for Measuring Maintainability |
Assessing Test Suite E ↵ ectiveness Using Static Metrics | The influence of size and coverage on test suite effectiveness |
Concealed CFRP Vehicle Chassis Antenna Cavity | A vehicular rooftop, shark-fin, multiband antenna for the GPS/LTE/cellular/DSRC systems |
Emotion Regulation in Adulthood: Timing Is Everything | The Emerging Field of Emotion Regulation: An Integrative Review |
Emotion Regulation in Adulthood: Timing Is Everything | Immune neglect : A source of durability bias in affective forecasting |
Emotion Regulation in Adulthood: Timing Is Everything | Antecedent- and Response-Focused Emotion Regulation: Divergent Consequences for Experience, Expression, and Physiology |
Genre Classification using Machine Learning Techniques | Audio Spectrogram Representations for Processing with Convolutional Neural Networks |
Genre Classification using Machine Learning Techniques | Musical genre classification of audio signals |
Genre Classification using Machine Learning Techniques | On the Use of Zero-Crossing Rate for an Application of Classification of Percussive Sounds |
Cross-lingual Entity Alignment via Joint Attribute-Preserving Embedding | Distributed Representations of Words and Phrases and their Compositionality |
Cross-lingual Entity Alignment via Joint Attribute-Preserving Embedding | Type-Constrained Representation Learning in Knowledge Graphs |
Cross-lingual Entity Alignment via Joint Attribute-Preserving Embedding | Knowledge representation learning with entities, attributes and relations |
Cross-lingual Entity Alignment via Joint Attribute-Preserving Embedding | Knowledge graph embedding by translating on hyperplanes |
Delta Voxel Cone Tracing | High-quality reflections, refractions, and caustics in Augmented Reality and their contribution to visual coherence |
Delta Voxel Cone Tracing | Interactive Indirect Illumination Using Voxel Cone Tracing |
gpu - based volume ray - casting with advanced illumination . | A practical model for subsurface light transport |
Design of a compact wideband planar 180° Hybrid ring using the composite right/left-handed transmission line | A Broadband Planar Magic-T Using Microstrip–Slotline Transitions |
Design of a compact wideband planar 180° Hybrid ring using the composite right/left-handed transmission line | A novel broad-band Chebyshev-response rat-race ring coupler |
Electric Load Forecasting Using an Artificial Neural Network | Learning internal representations by error propagation |
Bridging the Gap: From Research to Practical Advice | Belief & evidence in empirical software engineering |
Bridging the Gap: From Research to Practical Advice | Grasping reality through illusion—interactive graphics serving science |
Adapting Deep Network Features to Capture Psychological Representations | A nonparametric bayesian framework for constructing flexible feature representations |
Adapting Deep Network Features to Capture Psychological Representations | Backpropagation Applied to Handwritten Zip Code Recognition |
Adapting Deep Network Features to Capture Psychological Representations | Deep Supervised, but Not Unsupervised, Models May Explain IT Cortical Representation |
Non-Intrusive Energy Disaggregation Using Non-negative Matrix Factorization with Sum-to-k Constraint | Unsupervised Disaggregation for Non-intrusive Load Monitoring |
Non-Intrusive Energy Disaggregation Using Non-negative Matrix Factorization with Sum-to-k Constraint | Toward Non-Intrusive Load Monitoring via Multi-Label Classification |
Non-Intrusive Energy Disaggregation Using Non-negative Matrix Factorization with Sum-to-k Constraint | Unsupervised Disaggregation of Low Frequency Power Measurements |
Non-Intrusive Energy Disaggregation Using Non-negative Matrix Factorization with Sum-to-k Constraint | Real-Time Epileptic Seizure Detection from EEG Signals via Random Subspace Ensemble Learning |
A Survey of Prevention/Mitigation against Memory Corruption Attacks | AddressSanitizer : A Fast Address Sanity Checker |
An analytical model for multi-tier internet services and its applications | Performance Guarantees for Web Server End-Systems: A Control-Theoretical Approach |
An analytical model for multi-tier internet services and its applications | Adaptive Overload Control for Busy Internet Servers |
Exploiting SmartPhone USB Connectivity For Fun And Profit ! | Google Android: A State-of-the-Art Review of Security Mechanisms |
Exploiting SmartPhone USB Connectivity For Fun And Profit ! | Google Android: A Comprehensive Security Assessment |
Exploiting SmartPhone USB Connectivity For Fun And Profit ! | Detecting energy-greedy anomalies and mobile malware variants |
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains | detection of abrupt changes : theory and application 1 . |
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains | Building a Dynamic Reputation System for DNS |
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains | Measuring and Detecting Fast-Flux Service Networks |
SMILES Enumeration as Data Augmentation for Neural Network Modeling of Molecules | Return of the Devil in the Details: Delving Deep into Convolutional Nets |
SMILES Enumeration as Data Augmentation for Neural Network Modeling of Molecules | Deep Learning in Neural Networks: An Overview |
SMILES Enumeration as Data Augmentation for Neural Network Modeling of Molecules | Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups |
SMILES Enumeration as Data Augmentation for Neural Network Modeling of Molecules | Best practices for convolutional neural networks applied to visual document analysis |
Deep Image Clustering Using Convolutional Autoencoder Embedding with Inception-Like Block | Graph Regularized Nonnegative Matrix Factorization for Data Representation |
Deep Image Clustering Using Convolutional Autoencoder Embedding with Inception-Like Block | Agglomerative clustering using the concept of mutual nearest neighbourhood |
Deep Image Clustering Using Convolutional Autoencoder Embedding with Inception-Like Block | A Tutorial on Spectral Clustering |
Contrarian Investment, Extrapolation, and Risk | Noise Trader Risk in Financial Markets |
Contrarian Investment, Extrapolation, and Risk | Returns to Buying Winners and Selling Losers : Implications for Stock Market Efficiency |
The new face of violence tendency: Cyber bullying perpetrators and their victims | Cyberbullying: Another main type of bullying? |
The new face of violence tendency: Cyber bullying perpetrators and their victims | Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition |
The new face of violence tendency: Cyber bullying perpetrators and their victims | Relationships Between Bullying and Violence Among US Youth |
The new face of violence tendency: Cyber bullying perpetrators and their victims | Human Aggression |
Best practice recommendations for data screening | coefficient alpha and the internal structure of tests * a comparison of split - half formulas . |
Best practice recommendations for data screening | Least Median of Squares Regression |
Best practice recommendations for data screening | An evaluation of the consequences of using short measures of the Big Five personality traits. |
Best practice recommendations for data screening | self - reports how the questions shape the answers . |
Algorithms for large scale markov blanket discovery | Toward Optimal Feature Selection |
Algorithms for large scale markov blanket discovery | Learning bayesian networks from data: An efficient approach based on information theory |
Algorithms for large scale markov blanket discovery | Towards Principled Feature Selection: Relevancy, Filters and Wrappers |
High-Throughput Parallel Architecture for H.265/HEVC Deblocking Filter | Overview of the High Efficiency Video Coding (HEVC) Standard |
Optimizing EEG energy-based seizure detection using genetic algorithms | Spark: Cluster computing with working sets |
Optimizing EEG energy-based seizure detection using genetic algorithms | Wavelet-based EEG processing for computer-aided seizure detection and epilepsy diagnosis |
Optimizing EEG energy-based seizure detection using genetic algorithms | Application of Machine Learning To Epileptic Seizure Detection |
Understanding the functional neuroanatomy of acquired prosopagnosia | The Fusiform Face Area is Part of a Network that Processes Faces at the Individual Level |
Understanding the functional neuroanatomy of acquired prosopagnosia | The myth of the visual word form area |
Augmented Reality Driving Using Semantic Geo-Registration | Distance transforms of sampled functions |
Augmented Reality Driving Using Semantic Geo-Registration | orb - slam2 : an open - source slam system for monocular , stereo , and rgb - d cameras . |
Augmented Reality Driving Using Semantic Geo-Registration | Initialization techniques for 3D SLAM: A survey on rotation estimation and its use in pose graph optimization |
Further Meta-Evaluation of Machine Translation | Statistical Phrase-Based Translation |
Further Meta-Evaluation of Machine Translation | Bleu: A Method For Automatic Evaluation Of Machine Translation |
Further Meta-Evaluation of Machine Translation | Re-Evaluation The Role Of Bleu In Machine Translation Research |
Yes, we GAN: Applying Adversarial Techniques for Autonomous Driving | Large Scale GAN Training for High Fidelity Natural Image Synthesis |
Yes, we GAN: Applying Adversarial Techniques for Autonomous Driving | Learning to Drive from Simulation without Real World Labels |
Yes, we GAN: Applying Adversarial Techniques for Autonomous Driving | auto - encoding variational bayes . |
Yes, we GAN: Applying Adversarial Techniques for Autonomous Driving | Deep neural networks are easily fooled: High confidence predictions for unrecognizable images |
A Framework for Feature Selection in Clustering | Algorithms for Non-negative Matrix Factorization |
Sensitive and Efficient RF Harvesting Supply for Batteryless Backscatter Sensor Networks | E-WEHP: A Batteryless Embedded Sensor-Platform Wirelessly Powered From Ambient Digital-TV Signals |
Sensitive and Efficient RF Harvesting Supply for Batteryless Backscatter Sensor Networks | Recycling ambient microwave energy with broad-band rectenna arrays |
Sensitive and Efficient RF Harvesting Supply for Batteryless Backscatter Sensor Networks | Rectenna design and optimization using reciprocity theory and harmonic balance analysis for electromagnetic (EM) energy harvesting |
Sensitive and Efficient RF Harvesting Supply for Batteryless Backscatter Sensor Networks | Low-Power Far-Field Wireless Powering for Wireless Sensors |
student behavior in a web - based educational system : exit intent prediction . | A comparative analysis of machine learning techniques for student retention management |
student behavior in a web - based educational system : exit intent prediction . | unsupervised and semi - supervised clustering : a brief survey ∗ . |
On Generalization and Regularization in Deep Learning | Understanding deep learning requires rethinking generalization |
Security in Automotive Networks: Lightweight Authentication and Authorization | Entropy-based anomaly detection for in-vehicle networks |
Security in Automotive Networks: Lightweight Authentication and Authorization | LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks |
Facial expression recognition for neonatal pain assessment | Facial Expression Recognition in Image Sequences Using Geometric Deformation Features and Support Vector Machines |
Powers of Tensors and Fast Matrix Multiplication | Multiplying matrices faster than coppersmith-winograd |
Powers of Tensors and Fast Matrix Multiplication | Faster Algorithms for Rectangular Matrix Multiplication |
Multi-View Data Generation Without View Supervision | MVC: A Dataset for View-Invariant Clothing Retrieval and Attribute Prediction |
Multi-View Data Generation Without View Supervision | InfoGAN: Interpretable Representation Learning by Information Maximizing Generative Adversarial Nets |