corpusid int64 16 20.3M | abstract stringlengths 1 10k | updated stringdate 2020-04-14 15:01:41 2022-09-05 04:04:16 | externalids dict | url stringlengths 78 78 | title stringlengths 3 300 | authors listlengths 0 398 | venue stringlengths 0 300 | year int64 1.84k 2.02k ⌀ | referencecount int64 0 4.73k | citationcount int64 0 95k | influentialcitationcount int64 0 16.2k | isopenaccess bool 2
classes | s2fieldsofstudy listlengths 2 13 ⌀ | publicationtypes sequencelengths 1 5 ⌀ | publicationdate timestamp[s]date 1842-06-01 00:00:00 2022-08-30 00:00:00 ⌀ | journal dict | syntactic sequencelengths 0 71 | semantic sequencelengths 0 96 | union sequencelengths 0 106 | enhanced sequencelengths 0 167 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
16 | Volunteered Geographic Information (VGI) tools appear to enhance the possibilities offered by a collaborative approach to planning. The present paper analyzes both the results of experiences of the author and of those available in the literature, highlighting possible advantages and disadvantages. After a brief introdu... | 2022-08-28T10:16:42.597Z | {
"ACL": null,
"DBLP": "journals/fi/Rotondo12",
"ArXiv": null,
"MAG": "2142154367",
"CorpusId": "16",
"PubMed": null,
"DOI": "10.3390/fi4020563",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/f484c290244e8fa9b9e64a19a6385ad05543886d | The U-City Paradigm: Opportunities and Risks for E-Democracy in Collaborative Planning | [
{
"authorId": "2194162",
"name": "F. Rotondo"
}
] | Future Internet | 2,012 | 49 | 20 | 0 | true | [
{
"category": "Economics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2012-06-05T00:00:00 | {
"name": "Future Internet",
"volume": "4",
"pages": "563-574"
} | [
"ict"
] | [
"geo-spatial data",
"geospatial information",
"geo-spatial",
"ict",
"information and communication technologies"
] | [
"geospatial information",
"ict",
"geo-spatial data",
"geo-spatial",
"information and communication technologies"
] | [
"spatial data",
"geographic information system",
"information technology",
"software",
"computer science"
] |
26 | In this paper, we introduce a field-programmable gate array (FPGA) hardware architecture for the realization of an algorithm for computing the eigenvalue decomposition (EVD) of para-Hermitian polynomial matrices. Specifically, we develop a parallelized version of the second-order sequential best rotation (SBR2) algorit... | 2022-02-13T16:00:07.412Z | {
"ACL": null,
"DBLP": "conf/fpt/KasapR12",
"ArXiv": null,
"MAG": "1994418445",
"CorpusId": "26",
"PubMed": null,
"DOI": "10.1109/FPT.2012.6412125",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/7011b84b03f1d992962c4a6c87459f7742bc3165 | FPGA-based design and implementation of an approximate polynomial matrix EVD algorithm | [
{
"authorId": "12653318",
"name": "Server Kasap"
},
{
"authorId": "144237481",
"name": "Soydan Redif"
}
] | 2012 International Conference on Field-Programmable Technology | 2,012 | 16 | 1 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 2012-12-01T00:00:00 | {
"name": "2012 International Conference on Field-Programmable Technology",
"volume": null,
"pages": "135-140"
} | [
"computer hardware",
"hardware implementations",
"fpga architectures",
"proposed architectures",
"eigenvalue decomposition",
"field programmable gate array",
"hardware architecture"
] | [
"field programmable gate array",
"hardware implementations",
"programmable gate array",
"computer hardware",
"hardware architecture",
"eigenvalues",
"eigenvalue decomposition"
] | [
"computer hardware",
"hardware implementations",
"fpga architectures",
"programmable gate array",
"proposed architectures",
"eigenvalue decomposition",
"field programmable gate array",
"eigenvalues",
"hardware architecture"
] | [
"computer science",
"logic gates",
"network architecture",
"eigenvalues and eigenfunctions",
"computer networks",
"matrix algebra",
"mathematics"
] |
32 | Stress shielding is a well-known failure factor in hip implants. This work proposes a design concept for hip implants, using a combination of metallic stem with a polymer coating (polyether ether ketone (PEEK)). The proposed design concept is simulated using titanium alloy stems and PEEK coatings with thicknesses varyi... | 2022-09-02T03:41:44.559Z | {
"ACL": null,
"DBLP": "journals/cmmm/Anguiano-Sanchez16",
"ArXiv": null,
"MAG": "2294576422",
"CorpusId": "32",
"PubMed": "27051460",
"DOI": "10.1155/2016/6183679",
"PubMedCentral": "4808658"
} | https://www.semanticscholar.org/paper/298eb77d076209f5168f6f1fe27450bda37a21cf | Influence of PEEK Coating on Hip Implant Stress Shielding: A Finite Element Analysis | [
{
"authorId": "1409483450",
"name": "Jesica Anguiano-Sanchez"
},
{
"authorId": "2721717",
"name": "O. M. Romero"
},
{
"authorId": "49882892",
"name": "H. Siller"
},
{
"authorId": "1402178059",
"name": "J. Díaz-Elizondo"
},
{
"authorId": "1399517270",
"name": "... | Comput. Math. Methods Medicine | 2,016 | 38 | 36 | 2 | true | [
{
"category": "Materials Science",
"source": "s2-fos-model"
},
{
"category": "Engineering",
"source": "s2-fos-model"
},
{
"category": "Materials Science",
"source": "external"
},
{
"category": "Medicine",
"source": "external"
},
{
"category": "Computer Science",
... | [
"JournalArticle"
] | 2016-03-14T00:00:00 | {
"name": "Computational and Mathematical Methods in Medicine",
"volume": "2016",
"pages": null
} | [
"finite element analysis",
"von mises stress"
] | [
"finite element analysis",
"finite element method",
"von mises stress",
"correlation analysis",
"systems design"
] | [
"finite element analysis",
"correlation analysis",
"systems design",
"finite element method",
"von mises stress"
] | [
"mathematics",
"intelligent control",
"intelligent systems",
"artificial intelligence",
"computer systems",
"computer science"
] |
38 | This paper proposes an RF signal generator using a time domain harmonic suppression technique based on Fourier series analysis. The circuit consists of four differential ring voltage control oscillators (VCO's) with phase differences and the pulse signal summing circuit. By summing pulse signals from VCO's with appropr... | 2022-08-20T17:57:30.660Z | {
"ACL": null,
"DBLP": "journals/ieiceee/NakanoAIM12",
"ArXiv": null,
"MAG": "2007182960",
"CorpusId": "38",
"PubMed": null,
"DOI": "10.1587/elex.9.270",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/13b8b5bcc8e13ee69e7104a7107ba1663e818260 | RF signal generator using time domain harmonic suppression technique in 90nm CMOS | [
{
"authorId": "2053358173",
"name": "Kazuo Nakano"
},
{
"authorId": "3299508",
"name": "S. Amakawa"
},
{
"authorId": "1812191",
"name": "N. Ishihara"
},
{
"authorId": "1738592",
"name": "K. Masu"
}
] | IEICE Electron. Express | 2,012 | 6 | 0 | 0 | true | [
{
"category": "Engineering",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Engineering",
"source": "external"
}
] | [
"JournalArticle"
] | null | {
"name": "IEICE Electron. Express",
"volume": "9",
"pages": "270-275"
} | [
"rf signal",
"fourier",
"low phase noise",
"time domain",
"frequency ranges"
] | [
"rf signal",
"time domain",
"fourier",
"low phase noise",
"pulse train"
] | [
"rf signal",
"fourier",
"low phase noise",
"time domain",
"pulse train",
"frequency ranges"
] | [
"wireless telecommunication systems",
"microwaves",
"fourier transforms",
"fourier analysis",
"variable frequency oscillators",
"phase noise",
"time domain analysis",
"signal processing",
"antennas",
"computer networks",
"communication systems",
"telecommunication systems",
"spurious signal ... |
46 | Let G be a maximal planar graph with p vertices, and let Ck(G) denote the number of cycles of length k in G. We first present tight bounds for C3(G) and C4(G) in terms of p. We then give bounds for Ck(G) when 5 ≤ k ≤ p, and consider in particular bounds for Cp(G), in terms of p. Some conjectures and unsolved problems a... | 2022-09-01T14:34:31.733Z | {
"ACL": null,
"DBLP": "journals/jgt/HakimiS79",
"ArXiv": null,
"MAG": "2098281668",
"CorpusId": "46",
"PubMed": null,
"DOI": "10.1002/jgt.3190030108",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/f23d163a74290aa078c31e49538a435862ed403b | On the number of cycles of length k in a maximal planar graph | [
{
"authorId": "144779600",
"name": "S. Hakimi"
},
{
"authorId": "1762506",
"name": "E. Schmeichel"
}
] | J. Graph Theory | 1,979 | 4 | 40 | 6 | false | [
{
"category": "Mathematics",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 1979-03-01T00:00:00 | {
"name": "J. Graph Theory",
"volume": "3",
"pages": "69-86"
} | [
"graph g",
"planar graph"
] | [
"planar graph",
"vertex set",
"plane graphs",
"directed graphs",
"weighted graph"
] | [
"graph g",
"weighted graph",
"planar graph",
"plane graphs",
"vertex set",
"directed graphs"
] | [
"polynomial approximation",
"graphic methods",
"graph theory",
"theoretical computer science",
"computer science"
] |
47 | Table look-up is an attractive approach to implementing multiplication; however, the size of the requisite multiplication table is prohibitively large for wide operands. A novel transformation which reduces the number of table entries from 2/sup 2b/ to 2/sup b/, where b is the width of the operands, is presented. Two i... | 2022-02-13T16:01:27.040Z | {
"ACL": null,
"DBLP": "journals/tc/Ling90",
"ArXiv": null,
"MAG": "2046952501",
"CorpusId": "47",
"PubMed": null,
"DOI": "10.1109/12.53588",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/fb00d20a2a8b19e72b0ceb0c60e43a1c01dde290 | An Approach to Implementing Multiplication with Small Tables | [
{
"authorId": "31769355",
"name": "Heuey Ling"
}
] | IEEE Trans. Computers | 1,990 | 1 | 17 | 1 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 1990-05-01T00:00:00 | {
"name": "IEEE Trans. Computers",
"volume": "39",
"pages": "717-718"
} | [
"multiplication",
"table lookup"
] | [
"multiplication",
"multiplier",
"hardware implementations",
"sharing schemes"
] | [
"multiplier",
"sharing schemes",
"multiplication",
"hardware implementations",
"table lookup"
] | [
"frequency multiplying circuits",
"secret images",
"secret sharing schemes",
"multiplying circuits",
"field programmable gate array",
"secret sharing",
"steganography",
"information theory",
"adders",
"integrated circuit layout",
"digital signal processing",
"computer hardware",
"security of... |
55 | AdaBoost.MH is a boosting algorithm that is considered to be one of the most accurate algorithms for multilabel classification. It works by iteratively building a committee of weak hypotheses of decision stumps. To build the weak hypotheses, in each iteration, AdaBoost.MH obtains the whole extracted features and examin... | 2022-09-02T13:39:12.971Z | {
"ACL": null,
"DBLP": "journals/jis/Al-SalemiAN15",
"ArXiv": null,
"MAG": "2065235656",
"CorpusId": "55",
"PubMed": null,
"DOI": "10.1177/0165551514551496",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/987dbe601d2becca52af60dd2f758d0832337e56 | LDA-AdaBoost.MH: Accelerated AdaBoost.MH based on latent Dirichlet allocation for text categorization | [
{
"authorId": "1399765025",
"name": "Bassam Al-Salemi"
},
{
"authorId": "9281840",
"name": "Mohd Juzaiddin Abd. Aziz"
},
{
"authorId": "2480890",
"name": "S. Noah"
}
] | J. Inf. Sci. | 2,015 | 27 | 21 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2015-02-01T00:00:00 | {
"name": "Journal of Information Science",
"volume": "41",
"pages": "27 - 40"
} | [
"text representation",
"computational efficiency",
"adaptive boosting",
"boosting",
"text classification"
] | [
"adaptive boosting",
"text classification",
"document classification",
"text representation",
"computational efficiency",
"latent variable",
"latent factor",
"weak classifiers",
"boosting",
"haar-like features",
"svm",
"text document",
"document categorization"
] | [
"svm",
"document classification",
"latent variable",
"weak classifiers",
"text representation",
"computational efficiency",
"adaptive boosting",
"boosting",
"haar-like features",
"document categorization",
"text classification",
"text document",
"latent factor"
] | [
"support vector machine",
"text processing",
"information retrieval systems",
"correlation analysis",
"text mining",
"theoretical computer science",
"classifiers",
"face detection",
"matrix factorizations",
"natural language processing",
"computational linguistics",
"data mining",
"informati... |
66 | Smart buildings combine ICT and IoT technologies (e.g., smart appliances, sensors, actuators and smart meters) in order to provide supervision functions for Building Management Systems (BMS), which are capable to monitor and control both their physical elements (e.g., energy systems, network and storage facilities) and... | 2022-08-27T04:03:58.234Z | {
"ACL": null,
"DBLP": "conf/icin/AhvarSTIPBGC17",
"ArXiv": null,
"MAG": "2606067556",
"CorpusId": "66",
"PubMed": null,
"DOI": "10.1109/ICIN.2017.7899430",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/cd011cece28bb726f7e99e0f0f2e244ad234b80a | Ontology-based model for trusted critical site supervision in FUSE-IT | [
{
"authorId": "2444673",
"name": "S. Ahvar"
},
{
"authorId": "144025806",
"name": "Gabriel Santos"
},
{
"authorId": "3160280",
"name": "Nouredine Tamani"
},
{
"authorId": "8714567",
"name": "Bernard Istasse"
},
{
"authorId": "1683082",
"name": "Isabel Praça"
... | 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN) | 2,017 | 18 | 7 | 1 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Engineering",
"source": "s2-fos-model"
},
{
"category": "Engineering",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 2017-03-07T00:00:00 | {
"name": "2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)",
"volume": null,
"pages": "313-315"
} | [
"internet of things",
"ict",
"energy aware",
"cyber security",
"sensors",
"semantics",
"ontology",
"sensor networks",
"smart energy"
] | [
"ontology",
"smart homes",
"internet of things",
"ict",
"sensors",
"semantics",
"sensor networks",
"energy aware",
"cyber security"
] | [
"internet of things",
"ict",
"energy aware",
"cyber security",
"sensors",
"semantics",
"ontology",
"sensor networks",
"smart energy",
"smart homes"
] | [
"architecture types",
"internet",
"information and communication technologies",
"wireless sensor networks",
"computer crime",
"computer hardware",
"routers",
"wireless telecommunication systems",
"routing algorithms",
"embedded systems",
"smart cities",
"intelligent buildings",
"smart enviro... |
94 | Abstract This study examined the extent to which previous experience with duration in first language (L1) vowel distinctions affects the use of duration when perceiving vowels in a second language (L2). Native speakers of Greek (where duration is not used to differentiate vowels) and Japanese (where vowels are distingu... | 2022-09-04T03:57:07.509Z | {
"ACL": null,
"DBLP": "journals/phonetica/Lengeris09",
"ArXiv": null,
"MAG": "2072963766",
"CorpusId": "94",
"PubMed": "19776666",
"DOI": "10.1159/000235659",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/994b244379186e920a187c1b0978ba5bba799baa | Perceptual Assimilation and L2 Learning: Evidence from the Perception of Southern British English Vowels by Native Speakers of Greek and Japanese | [
{
"authorId": "2686522",
"name": "A. Lengeris"
}
] | Phonetica | 2,009 | 46 | 44 | 6 | false | [
{
"category": "Linguistics",
"source": "s2-fos-model"
},
{
"category": "Psychology",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Medicine",
"source": "external"
}
] | [
"JournalArticle"
] | 2009-09-01T00:00:00 | {
"name": "Phonetica",
"volume": "66",
"pages": "169 - 187"
} | [
"japanese"
] | [
"time windows",
"human visual systems",
"online learning",
"form perception",
"test results"
] | [
"time windows",
"form perception",
"japanese",
"human visual systems",
"online learning",
"test results"
] | [
"routing algorithms",
"pattern recognition, visual",
"asian continental ancestry group",
"image quality",
"image coding",
"online systems",
"sensors",
"computer networks",
"pattern recognition",
"genotype",
"genetic association",
"image analysis",
"image processing",
"computer systems",
... |
105 | Inverter-based implementation of operational-transconductance amplifiers (OTAs) is an attractive approach for low-voltage realization of analog sub-systems. However, the high sensitivity of inverter-like amplifiers performance to process and temperature variations limits the achievable performance of the whole system, ... | 2022-02-13T15:55:57.971Z | {
"ACL": null,
"DBLP": "conf/socc/MostafaI15",
"ArXiv": null,
"MAG": "2289530163",
"CorpusId": "105",
"PubMed": null,
"DOI": "10.1109/SOCC.2015.7406916",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/bfedff9893a1def07bde07160f84d1951f5cb82a | A Tunable Inverter-Based, Low-Voltage OTA for Continuous-Time ΣΔ ADC | [
{
"authorId": "47931812",
"name": "I. Mostafa"
},
{
"authorId": "39411727",
"name": "A. Ismail"
}
] | 2015 28th IEEE International System-on-Chip Conference (SOCC) | 2,015 | 21 | 0 | 0 | false | [
{
"category": "Engineering",
"source": "s2-fos-model"
},
{
"category": "Engineering",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 2015-09-01T00:00:00 | {
"name": "2015 28th IEEE International System-on-Chip Conference (SOCC)",
"volume": null,
"pages": "74-77"
} | [
"operational transconductance amplifiers",
"ota",
"signal bandwidth",
"continuous time"
] | [
"ota",
"transconductors",
"transconductance",
"continuous time",
"operational transconductance amplifiers",
"transconductance amplifier",
"signal bandwidth",
"bandwidth"
] | [
"transconductance amplifier",
"continuous time",
"bandwidth",
"operational transconductance amplifiers",
"signal bandwidth",
"transconductors",
"transconductance",
"ota"
] | [
"feedback amplifiers",
"continuous time systems",
"computer networks",
"gates (transistor)",
"amplifiers (electronic)",
"bandpass amplifiers",
"linear systems",
"linear matrix inequalities",
"computer science",
"integrated circuit layout",
"engineering",
"matrix algebra",
"vlsi circuits",
... |
107 | There is a large, popular, and growing literature on "scale-free" networks with the Internet along with metabolic networks representing perhaps the canonical examples. While this has in many ways reinvigorated graph theory, there is unfortunately no consistent, precise definition of scale-free graphs and few rigorous p... | 2022-09-05T01:04:01.840Z | {
"ACL": null,
"DBLP": "journals/im/LiADW05",
"ArXiv": "cond-mat/0501169",
"MAG": "2104828803",
"CorpusId": "107",
"PubMed": null,
"DOI": "10.1080/15427951.2005.10129111",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/8dd09cfe9d7b2d4a13e02693112b1f8afa37f222 | Towards a Theory of Scale-Free Graphs: Definition, Properties, and Implications | [
{
"authorId": "47681110",
"name": "Lun Li"
},
{
"authorId": "3293014",
"name": "D. Alderson"
},
{
"authorId": "145838187",
"name": "J. Doyle"
},
{
"authorId": "1744426",
"name": "W. Willinger"
}
] | Internet Math. | 2,005 | 256 | 605 | 48 | true | [
{
"category": "Mathematics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Physics",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
},
{
"category": "Biology",
"source": "externa... | [
"JournalArticle"
] | 2005-01-01T00:00:00 | {
"name": "Internet Mathematics",
"volume": "2",
"pages": "431 - 523"
} | [
"scale-free",
"betweenness",
"connected graph",
"graph theory",
"internet"
] | [
"free graphs",
"network architecture",
"internet",
"graph theory",
"connected graph",
"betweenness",
"formal proofs",
"directed graphs",
"weighted graph"
] | [
"weighted graph",
"network architecture",
"formal proofs",
"free graphs",
"scale-free",
"betweenness",
"connected graph",
"graph theory",
"directed graphs",
"internet"
] | [
"graphic methods",
"computer networks",
"formal verifications",
"formal logic",
"graph g",
"complex networks",
"social networks",
"theoretical computer science",
"computer science",
"verification",
"artificial intelligence",
"polynomial approximation",
"topology",
"world wide web",
"veri... |
110 | This paper presents a partial solution to a component of the problem of lexical choice: choosing the synonym most typical, or expected, in context. We apply a new statistical approach to representing the context of a word through lexical co-occurrence networks. The implementation was trained and evaluated on a large co... | 2022-09-04T11:04:27.341Z | {
"ACL": "P97-1067",
"DBLP": "conf/acl/Edmonds97",
"ArXiv": "cs/9811009",
"MAG": "2788969586",
"CorpusId": "110",
"PubMed": null,
"DOI": "10.3115/976909.979684",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/af55b01c7e330e78a845772c60bf39e0596463d2 | Choosing the Word Most Typical in Context Using a Lexical Co-occurrence Network | [
{
"authorId": "145660941",
"name": "P. Edmonds"
}
] | ACL | 1,997 | 11 | 97 | 7 | true | [
{
"category": "Linguistics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 1997-07-07T00:00:00 | {
"name": null,
"volume": null,
"pages": "507-509"
} | [] | [
"network architecture",
"correlation analysis",
"syntactics",
"part of speech",
"network components"
] | [
"part of speech",
"network architecture",
"network components",
"correlation analysis",
"syntactics"
] | [
"natural language processing",
"computer networks",
"program compilers",
"mathematics",
"computational linguistics",
"artificial intelligence",
"natural languages",
"computer science",
"parallel processing systems",
"computer programming languages",
"database systems",
"linguistics",
"semant... |
112 | Reiter proposed a semantics for knowledge-based Golog programs with sensing where program execution can be conditioned on tests involving explicit references to what the agent knows and does not know. An important result of this work is that reasoning about knowledge after the execution of actions can be reduced to cla... | 2022-09-04T22:31:29.984Z | {
"ACL": null,
"DBLP": "conf/kr/ClassenL06",
"ArXiv": null,
"MAG": "175138913",
"CorpusId": "112",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/6f30988144d35741ea0e13d9413f5059171d874f | Foundations for Knowledge-Based Programs using ES | [
{
"authorId": "38204277",
"name": "Jens Claßen"
},
{
"authorId": "1779592",
"name": "G. Lakemeyer"
}
] | KR | 2,006 | 26 | 19 | 2 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 2006-06-02T00:00:00 | {
"name": null,
"volume": null,
"pages": "318-328"
} | [
"program execution",
"reasoning",
"semantics"
] | [
"semantics",
"program execution",
"reasoning",
"domain knowledge",
"explicit knowledge"
] | [
"reasoning",
"explicit knowledge",
"domain knowledge",
"program execution",
"semantics"
] | [
"ontology",
"formal languages",
"knowledge management",
"knowledge based systems",
"program processors",
"program compilers",
"linguistics",
"formal languages and automata theory",
"artificial intelligence",
"parallel processing systems",
"microprocessor chips",
"computer programming languages... |
113 | A graphic monitor program is described. It was developed at Carnegie-Mellon University for the CDC G21 computer, which is a general purpose, batch-processing system with remote entry. The existing G21 system and the graphics hardware are described. The graphic monitor is a resident auxiliary monitor which provides comp... | 2022-02-13T16:01:26.365Z | {
"ACL": null,
"DBLP": "journals/cacm/BondRC69",
"ArXiv": null,
"MAG": "2023874040",
"CorpusId": "113",
"PubMed": null,
"DOI": "10.1145/363269.363273",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/b4f9611adafc9bd10bdc545e067caf6528060ce9 | An interactive graphical display monitor in a batch-processing environment with remote entry | [
{
"authorId": "2471086",
"name": "A. H. Bond"
},
{
"authorId": "16706866",
"name": "Jerry Rightnour"
},
{
"authorId": "145597191",
"name": "L. Coles"
}
] | CACM | 1,969 | 17 | 2 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 1969-11-01T00:00:00 | {
"name": "Commun. ACM",
"volume": "12",
"pages": "595-603"
} | [
"computer hardware",
"computer systems",
"graphics hardware",
"general purpose",
"university"
] | [
"graphical representations",
"university",
"general purpose",
"graphics hardware",
"computer hardware",
"computer systems"
] | [
"computer hardware",
"computer systems",
"graphics hardware",
"graphical representations",
"general purpose",
"university"
] | [
"computer science",
"interactive computer graphics",
"gpu",
"visualization",
"graphic methods",
"program processors",
"education",
"user interfaces",
"computer imaging and vision",
"human computer interaction",
"graph theory",
"parallel processing systems",
"microprocessor chips",
"theoret... |
114 | How much can randomness help computation? Motivated by this general question and by volume computation, one of the few instances where randomness provably helps, we analyze a notion of dispersion and connect it to asymptotic convex geometry. We obtain a nearly quadratic lower bound on the complexity of randomized volum... | 2022-09-02T08:57:43.539Z | {
"ACL": null,
"DBLP": "conf/focs/RademacherV06",
"ArXiv": "cs/0608054",
"MAG": "2043657648",
"CorpusId": "114",
"PubMed": null,
"DOI": "10.1109/FOCS.2006.26",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/495f26a2f968a56c64e01f2350954260d1458398 | Dispersion of Mass and the Complexity of Randomized Geometric Algorithms | [
{
"authorId": "1768081",
"name": "Luis Rademacher"
},
{
"authorId": "1737804",
"name": "S. Vempala"
}
] | 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06) | 2,006 | 57 | 18 | 1 | true | [
{
"category": "Mathematics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2006-08-12T00:00:00 | {
"name": "2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06)",
"volume": null,
"pages": "729-738"
} | [
"geometry"
] | [
"geometry",
"adaptive algorithms",
"nonconvex",
"efficient algorithm",
"optimization problems"
] | [
"geometry",
"nonconvex",
"efficient algorithm",
"adaptive algorithms",
"optimization problems"
] | [
"computational efficiency",
"software",
"correlation analysis",
"theoretical computer science",
"computer science",
"mathematics"
] |
119 | The framework of promise theory offers an alternative way of understanding programming models, especially in distributed systems. We show that promise theory can express some familiar constructs and resolve som problems in program interface design, using fewer and simpler concepts than the Unified Modelling Language (U... | 2022-09-03T14:53:33.216Z | {
"ACL": null,
"DBLP": "journals/corr/abs-0802-1586",
"ArXiv": "0802.1586",
"MAG": null,
"CorpusId": "119",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/81073e94d6d94f560382872fa3c19a3a8cf864dd | Program Promises | [
{
"authorId": "2466707",
"name": "D. Aredo"
},
{
"authorId": "145907404",
"name": "M. Burgess"
},
{
"authorId": "2070023176",
"name": "Simen Hagen"
}
] | ArXiv | 2,008 | 17 | 0 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2008-02-12T00:00:00 | {
"name": "ArXiv",
"volume": "abs/0802.1586",
"pages": null
} | [
"unified modeling language",
"modeling languages",
"programming models",
"som",
"distributed systems"
] | [
"programming models",
"unified modeling language",
"modeling languages",
"system theory",
"programming languages"
] | [
"unified modeling language",
"modeling languages",
"system theory",
"programming models",
"programming languages",
"som",
"distributed systems"
] | [
"software engineering",
"object oriented programming",
"computer programming languages",
"computational linguistics",
"linguistics",
"artificial intelligence",
"parallel programming",
"self organizing maps",
"distributed computer systems",
"computer science",
"computer programming",
"database ... |
122 | We examine possibility to design an efficient solving algorithm for problems of the class \np. It is introduced a classification of \np problems by the property that a partial solution of size $k$ can be extended into a partial solution of size $k+1$ in polynomial time. It is defined an unique class problems to be wort... | 2022-09-04T21:08:42.987Z | {
"ACL": null,
"DBLP": "journals/corr/cs-DS-9903010",
"ArXiv": "cs/9903010",
"MAG": "1552617269",
"CorpusId": "122",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/ece6e38017729b58a3d03c09ba305c2125a243c3 | A class of problems of NP to be worth to search an efficient solving algorithm | [
{
"authorId": "1803555",
"name": "A. Plotnikov"
}
] | ArXiv | 1,999 | 15 | 2 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 1999-03-11T00:00:00 | {
"name": "ArXiv",
"volume": "cs.DS/9903010",
"pages": null
} | [] | [
"adaptive algorithms",
"hybrid algorithms",
"classification models",
"supervised classification",
"classification methods"
] | [
"classification methods",
"hybrid algorithms",
"classification models",
"supervised classification",
"adaptive algorithms"
] | [
"computer systems",
"evolutionary algorithms",
"particle swarm optimization (pso)",
"image classification",
"software",
"computer science",
"genetic algorithms",
"optimization problems",
"optimization",
"swarm intelligence",
"imaging systems",
"artificial intelligence",
"correlation analysis... |
126 | Rush Hour Logic was introduced in [Flake&Baum99] as a model of computation inspired by the ``Rush Hour'' toy puzzle, in which cars can move horizontally or vertically within a parking lot. The authors show how the model supports polynomial space computation, using certain car configurations as building blocks to constr... | 2022-08-28T20:20:29.850Z | {
"ACL": null,
"DBLP": "journals/corr/abs-cs-0502068",
"ArXiv": "cs/0502068",
"MAG": "1774345111",
"CorpusId": "126",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/f51b3ffb1bababaacc0968040804cb604174311e | Limits of Rush Hour Logic Complexity | [
{
"authorId": "143871691",
"name": "J. Tromp"
},
{
"authorId": "2702975",
"name": "Rudi L. Cilibrasi"
}
] | ArXiv | 2,005 | 3 | 16 | 2 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2005-02-15T00:00:00 | {
"name": "ArXiv",
"volume": "abs/cs/0502068",
"pages": null
} | [
"cpu",
"polynomial space"
] | [
"polynomial space",
"boolean functions",
"cpu",
"parallel computation",
"efficient computation"
] | [
"boolean functions",
"parallel computation",
"efficient computation",
"cpu",
"polynomial space"
] | [
"mathematics",
"parallel algorithms",
"parallel computing",
"computational efficiency",
"gpu",
"polynomial approximation",
"exact algorithms",
"parallel processing systems",
"parallel architectures",
"theoretical computer science",
"program processors",
"graph theory",
"approximation algorit... |
127 | We present a new feature extraction approach to online Chinese handwriting recognition based on continuous-density hidden Markov models (CDHMM). Given an online handwriting sample, a sequence of time-ordered dominant points are extracted first, which include stroke-endings, points corresponding to local extrema of curv... | 2022-05-13T13:50:26.843Z | {
"ACL": null,
"DBLP": "conf/icdar/MaHS09",
"ArXiv": null,
"MAG": "2107437841",
"CorpusId": "127",
"PubMed": null,
"DOI": "10.1109/ICDAR.2009.24",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/55b2583fb53944437cdcf2e92e32f9506f414d90 | A Study of Feature Design for Online Handwritten Chinese Character Recognition Based on Continuous-Density Hidden Markov Models | [
{
"authorId": "2109705242",
"name": "Lei Ma"
},
{
"authorId": "2316043",
"name": "Qiang Huo"
},
{
"authorId": "145814852",
"name": "Yu Shi"
}
] | 2009 10th International Conference on Document Analysis and Recognition | 2,009 | 19 | 7 | 1 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 2009-07-26T00:00:00 | {
"name": "2009 10th International Conference on Document Analysis and Recognition",
"volume": null,
"pages": "526-530"
} | [
"vocabulary",
"hidden markov models",
"handwritten chinese character",
"discriminative training",
"maximum likelihood",
"chinese characters",
"chinese character recognition",
"hidden markov model (hmm)",
"handwriting recognition"
] | [
"hand-written characters",
"character recognition",
"handwritten chinese character",
"chinese characters",
"chinese character recognition",
"hidden markov models",
"hidden markov model (hmm)",
"markov model",
"handwriting recognition",
"vocabulary",
"maximum likelihood",
"discriminative traini... | [
"vocabulary",
"hidden markov models",
"hand-written characters",
"handwritten chinese character",
"discriminative training",
"maximum likelihood",
"chinese characters",
"chinese character recognition",
"hidden markov model (hmm)",
"character recognition",
"handwriting recognition",
"markov mod... | [
"linguistics",
"markov processes",
"computational linguistics",
"speech communication",
"maximum likelihood estimation",
"likelihood functions",
"pattern recognition",
"correlation analysis",
"database systems",
"mathematics",
"machine learning",
"computer systems",
"artificial intelligence"... |
130 | Abstract A fundamental problem in artificial intelligence isthat nobody really knows what intelligence is. Theproblem is especially acute when we need to con-sider artificial systems which are significantly dif-ferent to humans. In this paper we approach thisproblem in the following way: We take a numberof well known info... | 2022-09-04T23:27:48.703Z | {
"ACL": null,
"DBLP": "journals/corr/abs-cs-0605024",
"ArXiv": "cs/0605024",
"MAG": "1941295027",
"CorpusId": "130",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/215379780993ed63aa6bfc44a536f685252acf04 | A Formal Measure of Machine Intelligence | [
{
"authorId": "34313265",
"name": "S. Legg"
},
{
"authorId": "144154444",
"name": "Marcus Hutter"
}
] | ArXiv | 2,006 | 16 | 72 | 4 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2006-04-14T00:00:00 | {
"name": "ArXiv",
"volume": "abs/cs/0605024",
"pages": null
} | [
"machine learning",
"computer hardware"
] | [
"test results",
"combinatorial problems",
"combinatorial optimization",
"artificial intelligence",
"computing environments"
] | [
"computing environments",
"computer hardware",
"machine learning",
"artificial intelligence",
"test results",
"combinatorial problems",
"combinatorial optimization"
] | [
"cloud computing",
"computer science",
"sensors",
"combinatorial mathematics",
"optimization",
"computer systems",
"graph theory",
"mathematics",
"theoretical computer science"
] |
135 | Current peer-to-peer file-sharing systems mostly work on wired networks. Mobile ad hoc network is characterized as multihop wireless communications between mobile devices. Five routing approaches with different complexity are proposed to enable peer-to-peer file-sharing over mobile ad hoc networks. The complexity of th... | 2022-09-04T20:57:14.654Z | {
"ACL": null,
"DBLP": "conf/percom/DingB04",
"ArXiv": null,
"MAG": "2135861925",
"CorpusId": "135",
"PubMed": null,
"DOI": "10.1109/PERCOMW.2004.1276914",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/f7ed96d1ed8488e938e3181a502ca933d429c1d1 | Peer-to-peer file-sharing over mobile ad hoc networks | [
{
"authorId": "48654361",
"name": "G. Ding"
},
{
"authorId": "1712275",
"name": "B. Bhargava"
}
] | IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second | 2,004 | 11 | 215 | 7 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Business",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 2004-03-14T00:00:00 | {
"name": "IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second",
"volume": null,
"pages": "104-108"
} | [
"peer-to-peer file sharing",
"mobile devices",
"file-sharing system",
"wireless communications",
"mobile ad hoc",
"peer-to-peer",
"routing algorithms",
"ad hoc networks",
"multihop"
] | [
"file sharing",
"network architecture",
"mobile devices",
"multihop",
"wireless",
"wireless communications",
"communication",
"peer-to-peer",
"communication networks",
"mesh network",
"communication protocols",
"transport protocols"
] | [
"peer-to-peer file sharing",
"multihop",
"mobile devices",
"network architecture",
"file-sharing system",
"file sharing",
"wireless communications",
"mobile ad hoc",
"peer-to-peer",
"communication",
"wireless",
"communication networks",
"ad hoc networks",
"transport protocols",
"communic... | [
"wireless telecommunication systems",
"sensors",
"mobile computing",
"computer networks",
"mobile ad hoc networks",
"distributed computer systems",
"internet",
"radio",
"telecommunication networks",
"routers",
"mobile telecommunication systems",
"internet protocols",
"quality of service",
... |
141 | Protecting data from malicious computer users continues to grow in importance. Whether preventing unauthorized access to personal photographs, ensuring compliance with federal regulations, or ensuring the integrity of corporate secrets, all applications require increased security to protect data from talented intruders... | 2022-08-30T10:27:43.945Z | {
"ACL": null,
"DBLP": "journals/corr/cs-OS-0409034",
"ArXiv": "cs/0409034",
"MAG": "1623304972",
"CorpusId": "141",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/a877883b0e0d2c165ea2da58109954d53e6954c5 | Securing Data in Storage: A Review of Current Research | [
{
"authorId": "119712555",
"name": "P. Stanton"
}
] | ArXiv | 2,004 | 43 | 17 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Review"
] | 2004-09-17T00:00:00 | {
"name": "ArXiv",
"volume": "cs.OS/0409034",
"pages": null
} | [
"storage systems"
] | [
"storage systems",
"storage devices",
"malicious behavior",
"secret key",
"data security"
] | [
"storage systems",
"malicious behavior",
"secret key",
"storage devices",
"data security"
] | [
"computer systems",
"malicious nodes",
"malwares",
"intrusion detection",
"public key cryptography",
"encryption",
"flash memory",
"data privacy",
"network security",
"computer science",
"ad hoc networks",
"wireless sensor networks",
"routing protocols",
"operating systems",
"computer cr... |
145 | Broadcast networks are often used in modern communication systems. A common broadcast network is a single hop shared media system, where a transmitted message is heard by all neighbors, such as some LAN networks. In this work we consider a more complex environment, in which a transmitted message is heard only by a grou... | 2022-06-20T12:15:14.448Z | {
"ACL": null,
"DBLP": "journals/corr/cs-DC-9909011",
"ArXiv": "cs/9909011",
"MAG": "1619605337",
"CorpusId": "145",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/43ba9519a5a17c0d47439bd104f80c477f0ea7f4 | Distributed Algorithms in Multihop Broadcast Networks | [
{
"authorId": "1735597",
"name": "I. Cidon"
},
{
"authorId": "3299563",
"name": "O. Mokryn"
}
] | ArXiv | 1,999 | 13 | 0 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 1999-09-08T00:00:00 | {
"name": "ArXiv",
"volume": "cs.DC/9909011",
"pages": null
} | [
"mobile communications",
"lan",
"broadcast",
"radio networks",
"leader election",
"wireless",
"ad hoc networks",
"efficient algorithm",
"multihop",
"communication systems"
] | [
"efficient algorithm",
"multihop",
"broadcast",
"data broadcast",
"communication",
"communication systems",
"lan",
"ad hoc networks",
"radio",
"wireless",
"radio networks",
"mobile communications",
"leader election"
] | [
"mobile communications",
"lan",
"broadcast",
"communication",
"leader election",
"wireless",
"communication systems",
"ad hoc networks",
"efficient algorithm",
"multihop",
"data broadcast",
"radio networks",
"radio"
] | [
"mobile telecommunication systems",
"local area networks",
"broadcasting",
"distributed algorithm",
"computer systems",
"routers",
"internet protocols",
"quality of service",
"wireless local area networks (wlan)",
"multicasts",
"routing algorithms",
"sensors",
"computational efficiency",
"... |
148 | We address the problem of automatically constructing a thesaurus by clustering words based on corpus data. We view this problem as that of estimating a joint distribution over the Cartesian product of a partition of a set of nouns and a partition of a set of verbs, and propose a learning algorithm based on the Minimum ... | 2022-09-05T00:56:45.194Z | {
"ACL": "C96-1003",
"DBLP": "journals/corr/cmp-lg-9605014",
"ArXiv": "cmp-lg/9605014",
"MAG": "1964268963",
"CorpusId": "148",
"PubMed": null,
"DOI": "10.3115/992628.992633",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/70553687a7fd9369474edc22971e11cecd5514f7 | Clustering Words with the MDL Principle | [
{
"authorId": "2118384241",
"name": "Hang Li"
},
{
"authorId": "145629164",
"name": "N. Abe"
}
] | COLING | 1,996 | 62 | 38 | 1 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 1996-05-11T00:00:00 | {
"name": "ArXiv",
"volume": "cmp-lg/9605014",
"pages": null
} | [
"maximum likelihood estimate",
"clustering algorithms",
"maximum likelihood estimator",
"maximum likelihood estimation"
] | [
"maximum likelihood",
"maximum likelihood estimator",
"maximum likelihood estimation",
"maximum likelihood estimate",
"word sense disambiguation"
] | [
"word sense disambiguation",
"maximum likelihood estimator",
"maximum likelihood",
"maximum likelihood estimation",
"maximum likelihood estimate",
"clustering algorithms"
] | [
"word segmentation",
"likelihood functions",
"mathematics",
"data mining",
"natural language processing",
"computational linguistics",
"character recognition",
"correlation analysis",
"computer science",
"artificial intelligence",
"natural languages",
"database systems",
"pattern recognition... |
153 | We consider the Godel bi-modal logic determined by fuzzy Kripke models where both the propositions and the accessibility relation are infinitely valued over the standard Godel algebra [0,1], and prove strong completeness of the Fischer Servi intuitionistic modal logic IK plus the prelinearity axiom with respect to this... | 2022-09-04T05:36:21.556Z | {
"ACL": null,
"DBLP": "journals/logcom/CaicedoR15",
"ArXiv": "1110.2407",
"MAG": "2169921622",
"CorpusId": "153",
"PubMed": null,
"DOI": "10.1093/logcom/exs036",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/7e6dba2d331750c3f1d31d249aa6dfc18a71d7f9 | Bi-modal Gödel logic over [0, 1]-valued Kripke frames | [
{
"authorId": "1753722",
"name": "X. Caicedo"
},
{
"authorId": "1805286",
"name": "R. Rodríguez"
}
] | J. Log. Comput. | 2,011 | 40 | 54 | 3 | true | [
{
"category": "Philosophy",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2011-10-11T00:00:00 | {
"name": "ArXiv",
"volume": "abs/1110.2407",
"pages": null
} | [
"frames",
"modal logic",
"semantics",
"kripke model"
] | [
"kripke model",
"frames",
"modal logic",
"semantics",
"kripke semantics"
] | [
"modal logic",
"kripke semantics",
"frames",
"semantics",
"kripke model"
] | [
"formal logic",
"structural frames",
"artificial intelligence",
"hidden markov models",
"markov random fields",
"hidden markov model (hmm)",
"computer science",
"markov processes",
"image segmentation",
"correlation analysis",
"image analysis",
"image processing",
"mathematics",
"computer ... |
157 | Nous donnons ici quelques resultats sur les fonctions recursives au moyen des fibrations. Une premiere approche de cette formalisation avait ete faite par P. Mulry en utilisant la theorie des topos. En utilisant les resultats trouves ici, nous donnons les premieres definitions pour une formalisation abstraite des fonct... | 2022-04-22T04:41:07.410Z | {
"ACL": null,
"DBLP": "journals/ita/Mijoule95",
"ArXiv": null,
"MAG": "1603906406",
"CorpusId": "157",
"PubMed": null,
"DOI": "10.1051/ita/1995290301931",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/310f1a47791172ea103618816e00e2c68c04e1fa | Fibrations and Recursivity | [
{
"authorId": "2096420327",
"name": "Richard Mijoule"
}
] | RAIRO Theor. Informatics Appl. | 1,995 | 10 | 0 | 0 | true | null | [
"JournalArticle"
] | null | {
"name": "RAIRO Theor. Informatics Appl.",
"volume": "29",
"pages": "193-208"
} | [] | [
"intercarrier interference",
"mai",
"intercell interference",
"formal semantics"
] | [
"formal semantics",
"mai",
"intercell interference",
"intercarrier interference"
] | [
"formal methods",
"formal languages",
"multiple access interference",
"radio interference",
"carrier frequency offsets",
"frequency division multiplexing",
"ofdm systems",
"bit error rate",
"signal interference",
"formal logic",
"linguistics",
"formal languages and automata theory",
"spread ... |
158 | For practical wireless DS-CDMA systems, channel estimation is imperfect due to noise and interference. The impact of channel estimation error on multiuser detection (MUD) is analyzed under the framework of the replica method. System performance is obtained in the large system limit for optimal MUD, linear MUD and turbo... | 2022-09-04T05:52:25.430Z | {
"ACL": null,
"DBLP": "conf/globecom/LiP04b",
"ArXiv": "cs/0501047",
"MAG": "1596699513",
"CorpusId": "158",
"PubMed": null,
"DOI": "10.1109/GLOCOM.2004.1379047",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/340ede90d0fdcf15150b9f2a5abe872c4b1b2ad3 | Impact of channel estimation error on multiuser detection via the replica method | [
{
"authorId": "49404051",
"name": "Husheng Li"
},
{
"authorId": "145967056",
"name": "H. Poor"
}
] | IEEE Global Telecommunications Conference, 2004. GLOBECOM '04. | 2,004 | 29 | 5 | 1 | false | [
{
"category": "Business",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 2004-11-29T00:00:00 | {
"name": "IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.",
"volume": "6",
"pages": "3636-3640 Vol.6"
} | [
"multiuser detection",
"channel estimation",
"numerical results",
"wireless",
"ds-cdma system",
"channel estimation errors"
] | [
"channel estimation",
"channel estimation errors",
"estimation method",
"multiuser detection",
"multi-user detectors",
"wireless",
"cdma system",
"numerical results"
] | [
"estimation method",
"multiuser detection",
"numerical results",
"channel estimation",
"cdma system",
"wireless",
"ds-cdma system",
"channel estimation errors",
"multi-user detectors"
] | [
"numerical model",
"code division multiple access",
"signal receivers",
"signal interference",
"wireless telecommunication systems",
"numerical methods",
"communication channels",
"radio",
"ds-cdma",
"channel state information",
"multiple access interference",
"mathematics",
"signal to noise... |
161 | Current verification condition (VC) generation algorithms, such as weakest preconditions, yield a VC whose size may be exponential in the size of the code fragment being checked. This paper describes a two-stage VC generation algorithm that generates compact VCs whose size is worst-case quadratic in the size of the sou... | 2022-09-04T19:12:06.372Z | {
"ACL": null,
"DBLP": "conf/popl/FlanaganS01",
"ArXiv": null,
"MAG": "1992431017",
"CorpusId": "161",
"PubMed": null,
"DOI": "10.1145/360204.360220",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/5152efb643850236f96daecdbb5d879782ffde77 | Avoiding exponential explosion: generating compact verification conditions | [
{
"authorId": "144692078",
"name": "C. Flanagan"
},
{
"authorId": "1804564",
"name": "J. Saxe"
}
] | POPL '01 | 2,001 | 22 | 262 | 29 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | null | {
"name": null,
"volume": null,
"pages": "193-205"
} | [
"verification",
"code fragments",
"java"
] | [
"verification",
"verification method",
"java",
"adaptive algorithms",
"post-conditions"
] | [
"verification",
"code fragments",
"post-conditions",
"verification method",
"adaptive algorithms",
"java"
] | [
"verification and validation",
"code clone",
"model checking",
"formal verifications",
"software",
"object oriented programming",
"computer programming languages",
"high level languages",
"software quality",
"clone detection",
"source codes",
"embedded systems",
"architecture verification an... |
162 | The bisimulation problem for equational graphs of finite out-degree is shown to be decidable. We reduce this problem to the $\eta$-bisimulation problem for deterministic rational (vectors of) boolean series on the alphabet of a deterministic pushdown automaton ${\cal M}$. We then exhibit a complete formal system for de... | 2022-09-03T22:12:18.456Z | {
"ACL": null,
"DBLP": "journals/siamcomp/Senizergues05",
"ArXiv": "cs/0008018",
"MAG": "2022264236",
"CorpusId": "162",
"PubMed": null,
"DOI": "10.1137/S0097539700377256",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/974267bbb05a78ee2677c140e2a3a1c904731f24 | The Bisimulation Problem for Equational Graphs of Finite Out-Degree | [
{
"authorId": "1743477",
"name": "Géraud Sénizergues"
}
] | SIAM J. Comput. | 2,000 | 51 | 48 | 7 | true | [
{
"category": "Mathematics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 2000-08-22T00:00:00 | {
"name": "SIAM J. Comput.",
"volume": "34",
"pages": "1025-1106"
} | [
"automation",
"deterministic"
] | [
"boolean functions",
"deterministic",
"push-down automata",
"automation",
"nondeterministic finite automaton"
] | [
"boolean functions",
"automation",
"nondeterministic finite automaton",
"push-down automata",
"deterministic"
] | [
"mathematics",
"engineering",
"translation (languages)",
"number of state",
"pipeline processing systems",
"finite automata",
"stochastic",
"computational linguistics",
"automata theory",
"linguistics",
"program processors",
"stochastic processes",
"stochasticity",
"database systems",
"f... |
167 | Sound and complete axiomatizations are provided for a number of different logics involving modalities for knowledge and time. These logics arise from different choices for various parameters regarding the interaction of knowledge with time and regarding the language used. All the logics considered involve the discrete ... | 2022-09-04T19:17:41.590Z | {
"ACL": null,
"DBLP": "journals/corr/cs-LO-0208033",
"ArXiv": "cs/0208033",
"MAG": "1645519945",
"CorpusId": "167",
"PubMed": null,
"DOI": "10.1137/S0097539797320906",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/3a0d6ec2a7a0111cbf899d15f222e61b8e71559a | Complete Axiomatizations for Reasoning about Knowledge and Time | [
{
"authorId": "1691828",
"name": "Joseph Y. Halpern"
},
{
"authorId": "1780250",
"name": "R. V. D. Meyden"
},
{
"authorId": "9083969",
"name": "Moshe Y. Vardi"
}
] | SIAM J. Comput. | 2,002 | 21 | 190 | 19 | true | [
{
"category": "Philosophy",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2002-08-20T00:00:00 | {
"name": "ArXiv",
"volume": "cs.LO/0208033",
"pages": null
} | [
"discrete-time",
"reasoning",
"single-agent",
"linear temporal logic",
"semantics"
] | [
"reasoning",
"discrete-time",
"linear temporal logic",
"temporal logic",
"software agents",
"intelligent agents",
"semantics"
] | [
"reasoning",
"discrete-time",
"single-agent",
"software agents",
"linear temporal logic",
"temporal logic",
"intelligent agents",
"semantics"
] | [
"ontology",
"formal languages",
"discrete time control systems",
"multi-agent",
"multiagent system",
"model checking",
"automata theory",
"formal logic",
"linguistics",
"formal languages and automata theory",
"nonlinear control systems",
"linear matrix inequalities",
"artificial intelligence... |
170 | We consider the problem of coloring Erdös-Rényi and regular random graphs of finite connectivity using q colors. It has been studied so far using the cavity approach within the so-called one-step replica symmetry breaking (1RSB) ansatz. We derive a general criterion for the validity of this ansatz and, applying it to t... | 2022-09-04T06:23:59.789Z | {
"ACL": null,
"DBLP": "journals/corr/cond-mat-0403725",
"ArXiv": "cond-mat/0403725",
"MAG": "1980731606",
"CorpusId": "170",
"PubMed": "15600563",
"DOI": "10.1103/PhysRevE.70.046705",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/f379e4b8621092fad560b65098dea35c7678df40 | Threshold values, stability analysis and high-q asymptotics for the coloring problem on random graphs | [
{
"authorId": "2909402",
"name": "F. Krzakala"
},
{
"authorId": "1774629",
"name": "A. Pagnani"
},
{
"authorId": "1817094",
"name": "M. Weigt"
}
] | Physical review. E, Statistical, nonlinear, and soft matter physics | 2,004 | 83 | 55 | 5 | true | [
{
"category": "Mathematics",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "external"
},
{
"category": "Physics",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Medicine",
"source": "extern... | [
"JournalArticle"
] | 2004-03-30T00:00:00 | {
"name": "Physical review. E, Statistical, nonlinear, and soft matter physics",
"volume": "70 4 Pt 2",
"pages": "\n 046705\n "
} | [
"random graphs",
"coloring problems",
"coloring"
] | [
"coloring",
"random graphs",
"global stability",
"asymptotic stability",
"asymptotical stability"
] | [
"coloring problems",
"asymptotical stability",
"random graphs",
"asymptotic stability",
"global stability",
"coloring"
] | [
"graph coloring",
"control system stability",
"stability criteria",
"delay control systems",
"sufficient conditions",
"numerical example",
"graph theory",
"random processes",
"linear matrix inequalities",
"adaptive control systems",
"lyapunov functions",
"control system analysis",
"control s... |
171 | Presently, tree coders are the best bi-level image coders. The current ISO standard, JBIG, is a good example. By organising code length calculations properly a vast number of possible models (trees) can be investigated within reasonable time prior to generating code. Three general-purpose coders are constructed by this... | 2022-08-24T09:46:35.915Z | {
"ACL": null,
"DBLP": "conf/dcc/MartinsF96",
"ArXiv": null,
"MAG": "2129182828",
"CorpusId": "171",
"PubMed": null,
"DOI": "10.1109/DCC.1996.488332",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/229de59406eaf24f158e497ea3a22f9d6ae1ef9b | Bi-level image compression with tree coding | [
{
"authorId": "2937905",
"name": "B. Martins"
},
{
"authorId": "1709891",
"name": "S. Forchhammer"
}
] | Proceedings of Data Compression Conference - DCC '96 | 1,996 | 18 | 26 | 6 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 1996-03-31T00:00:00 | {
"name": "Proceedings of Data Compression Conference - DCC '96",
"volume": null,
"pages": "270-279"
} | [
"coding scheme",
"compression performance",
"image compression",
"code length"
] | [
"reference image",
"color images",
"digital image",
"image compression",
"compression ratio (machinery)",
"code length",
"general purpose",
"compression performance"
] | [
"compression performance",
"compression ratio (machinery)",
"digital image",
"reference image",
"image compression",
"code length",
"general purpose",
"coding scheme",
"color images"
] | [
"data compression",
"imaging systems",
"image analysis",
"image processing",
"image matching",
"image quality",
"image coding",
"coding errors",
"ldpc codes",
"program processors",
"network coding",
"pattern recognition",
"color image processing",
"image reconstruction",
"computer imagin... |
172 | To render images from a three-dimensional array of sample values, it is necessary to interpolate between the samples. This paper is concerned with interpolation methods that are equivalent to convolving the samples with a reconstruction filter; this covers all commonly used schemes, including trilinear and cubic interp... | 2022-09-04T22:14:05.890Z | {
"ACL": null,
"DBLP": "conf/visualization/MarschnerL94",
"ArXiv": null,
"MAG": "2111794246",
"CorpusId": "172",
"PubMed": null,
"DOI": "10.1109/VISUAL.1994.346331",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/959a84bc27f953c91561df8833d25f2847ec2911 | An evaluation of reconstruction filters for volume rendering | [
{
"authorId": "2593798",
"name": "S. Marschner"
},
{
"authorId": "144524076",
"name": "R. Lobb"
}
] | Proceedings Visualization '94 | 1,994 | 28 | 339 | 50 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 1994-10-17T00:00:00 | {
"name": "Proceedings Visualization '94",
"volume": null,
"pages": "100-107"
} | [
"reconstruction",
"signal processing",
"image quality"
] | [
"reconstruction",
"interpolation algorithms",
"signal processing",
"image quality",
"spline interpolation",
"color images",
"reference image",
"digital image"
] | [
"interpolation algorithms",
"spline interpolation",
"digital image",
"reference image",
"image quality",
"reconstruction",
"signal processing",
"color images"
] | [
"numerical control systems",
"splines",
"image analysis",
"image processing",
"image matching",
"image reconstruction",
"engineering",
"pattern recognition",
"color image processing",
"process control",
"machining",
"computer control systems",
"computer aided design",
"computer imaging and... |
173 | The easy-hard-easy pattern in the difficulty of combinatorial search problems as constraints are added has been explained as due to a competition between the decrease in number of solutions and increased pruning. We test the generality of this explanation by examining one of its predictions: if the number of solutions ... | 2022-09-03T03:16:19.083Z | {
"ACL": null,
"DBLP": "journals/jair/MammenH97",
"ArXiv": "cs/9707101",
"MAG": "2950953913",
"CorpusId": "173",
"PubMed": null,
"DOI": "10.1613/jair.370",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/86b3fc8bcdb6361cdc0a89275ba780721a1f6726 | A New Look at the Easy-Hard-Easy Pattern of Combinatorial Search Difficulty | [
{
"authorId": "2663403",
"name": "Dorothy L. Mammen"
},
{
"authorId": "144157926",
"name": "T. Hogg"
}
] | J. Artif. Intell. Res. | 1,997 | 22 | 47 | 3 | true | [
{
"category": "Economics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 1997-06-30T00:00:00 | {
"name": "J. Artif. Intell. Res.",
"volume": "7",
"pages": "47-66"
} | [] | [
"search process",
"search engines",
"investment costs",
"capital investment",
"combinatorial problems"
] | [
"search engines",
"search process",
"combinatorial problems",
"capital investment",
"investment costs"
] | [
"world wide web",
"evolutionary algorithms",
"combinatorial mathematics",
"investments",
"internet",
"genetic algorithms",
"graph theory",
"economics",
"computer science",
"artificial intelligence",
"theoretical computer science"
] |
176 | With the increasing in complexion of large-scale activities in business process, workflow model has been focused on highly than before. In this research, a new workflow model (WfM) with two layers (Step and Task layers) was proposed, which leads to process logic and concrete affairs couple loose, and deals with problem... | 2022-08-25T04:11:08.543Z | {
"ACL": null,
"DBLP": "conf/apscc/ZhaoXM06",
"ArXiv": null,
"MAG": null,
"CorpusId": "176",
"PubMed": null,
"DOI": "10.1109/APSCC.2006.103",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/112fa3232d4d7cfc2b4109fa0dee4891e6f083ae | The Research and Realization of a New Workflow Model with Step-Task Two Layers Based on Document | [
{
"authorId": "46586837",
"name": "Lin Zhao"
},
{
"authorId": "143801516",
"name": "J. Xing"
},
{
"authorId": "46643492",
"name": "Lingguo Meng"
}
] | APSCC | 2,006 | 17 | 5 | 1 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | null | {
"name": null,
"volume": null,
"pages": "285-292"
} | [
"parsing algorithm",
"business process",
"directed graphs"
] | [
"business process",
"electronic document",
"text document",
"bpm",
"routing scheme"
] | [
"bpm",
"electronic document",
"parsing algorithm",
"business process",
"routing scheme",
"text document",
"directed graphs"
] | [
"word processing",
"natural language processing",
"computational linguistics",
"formal languages",
"information systems",
"routing protocols",
"routing algorithms",
"text mining",
"information retrieval systems",
"graph theory",
"text processing",
"artificial intelligence",
"natural language... |
181 | Interest in grid computing has grown significantly over the past five years. Management of distributed cluster resources is a key issue in grid computing. Central to management of resources is the effectiveness of resource allocation, as it determines the overall utility of the system. In this paper, we propose a new g... | 2022-09-04T23:09:17.258Z | {
"ACL": null,
"DBLP": "conf/cluster/RanjanBH05",
"ArXiv": "cs/0605060",
"MAG": "1968867007",
"CorpusId": "181",
"PubMed": null,
"DOI": "10.1109/CLUSTR.2005.347038",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/c1842e6b818b7e572140dee401eb56893f5f6fe8 | A Case for Cooperative and Incentive-Based Coupling of Distributed Clusters | [
{
"authorId": "144928956",
"name": "R. Ranjan"
},
{
"authorId": "1709598",
"name": "R. Buyya"
},
{
"authorId": "145098019",
"name": "A. Harwood"
}
] | 2005 IEEE International Conference on Cluster Computing | 2,005 | 58 | 37 | 0 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 2005-09-01T00:00:00 | {
"name": "2005 IEEE International Conference on Cluster Computing",
"volume": null,
"pages": "1-11"
} | [
"grid computing",
"qos",
"grid systems"
] | [
"grid node",
"grid computing",
"qos",
"grid environments",
"computational grids",
"grid systems",
"multiagent system",
"time delay",
"queueing delays"
] | [
"time delay",
"qos",
"grid node",
"grid environments",
"grid systems",
"computational grids",
"grid computing",
"queueing delays",
"multiagent system"
] | [
"computer systems",
"quality of service",
"parallel processing systems",
"queuing network",
"artificial intelligence",
"computer science",
"telecommunication traffic",
"bandwidth",
"distributed systems",
"queueing theory",
"telecommunication networks",
"computer networks",
"distributed compu... |
187 | Gaussian mixture models (GMM) and support vector machines (SVM) are introduced to classify faults in a population of cylindrical shells. The proposed procedures are tested on a population of 20 cylindrical shells and their performance is compared to the procedure, which uses multi-layer perceptrons (MLP). The modal pro... | 2022-09-02T04:55:05.440Z | {
"ACL": null,
"DBLP": "journals/corr/abs-0705-0197",
"ArXiv": "0705.0197",
"MAG": "2004012946",
"CorpusId": "187",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/768a67872f5d9d21306d4d567819277955c60ae6 | Fault Classification in Cylinders Using Multilayer Perceptrons, Support Vector Machines and Guassian Mixture Models | [
{
"authorId": "1740675",
"name": "T. Marwala"
},
{
"authorId": "2746742",
"name": "Unathi Mahola"
},
{
"authorId": "47204741",
"name": "S. Chakraverty"
}
] | ArXiv | 2,007 | 26 | 5 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2007-05-01T00:00:00 | {
"name": "ArXiv",
"volume": "abs/0705.0197",
"pages": null
} | [
"classification rates",
"svm",
"support vector machine",
"vibration data",
"multilayer perceptrons",
"gaussian mixtures"
] | [
"support vector machine",
"multilayer perceptrons",
"support vector",
"svm",
"gaussians",
"gaussian mixtures",
"vibration data",
"classification rates"
] | [
"classification rates",
"svm",
"support vector",
"support vector machine",
"vibration data",
"gaussians",
"multilayer perceptrons",
"gaussian mixtures"
] | [
"classification methods",
"classifiers",
"vibration signal",
"gaussian distribution",
"neural networks",
"computer systems",
"machine learning",
"wavelet transforms",
"fault detection",
"gaussian noise (electronic)",
"computer science",
"artificial intelligence",
"image processing",
"mathe... |
190 | We consider a general multiple-antenna network with multiple sources, multiple destinations, and multiple relays in terms of the diversity-multiplexing tradeoff (DMT). We examine several subcases of this most general problem taking into account the processing capability of the relays (half-duplex or full-duplex), and t... | 2022-09-05T02:26:52.927Z | {
"ACL": null,
"DBLP": "journals/tit/YukselE07",
"ArXiv": "cs/0609122",
"MAG": "1838709606",
"CorpusId": "190",
"PubMed": null,
"DOI": "10.1109/TIT.2007.904972",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/e161d3659a48c47a9018d4f8fa5ca59d94a93ae6 | Multiple-Antenna Cooperative Wireless Systems: A Diversity–Multiplexing Tradeoff Perspective | [
{
"authorId": "144769056",
"name": "M. Yuksel"
},
{
"authorId": "1766950",
"name": "E. Erkip"
}
] | IEEE Transactions on Information Theory | 2,006 | 111 | 351 | 37 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Business",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2006-09-21T00:00:00 | {
"name": "IEEE Transactions on Information Theory",
"volume": "53",
"pages": "3371-3393"
} | [
"direct links",
"half-duplex",
"geometry",
"diversity-multiplexing trade-off",
"antennas",
"mimo",
"decode-and-forward",
"multiple-input-multiple-output",
"wireless",
"relay channels",
"half-duplex relay",
"full-duplex",
"single antenna",
"cooperative systems",
"multiple access relay cha... | [
"multiple antenna",
"antennas",
"wireless",
"multiplexing",
"decode-and-forward relay",
"geometry",
"relay channels",
"multiple access",
"single antenna",
"mimo",
"cooperative systems"
] | [
"direct links",
"half-duplex",
"antennas",
"diversity-multiplexing trade-off",
"geometry",
"mimo",
"decode-and-forward",
"multiplexing",
"multiple access",
"multiple antenna",
"wireless",
"relay channels",
"multiple access relay channel",
"half-duplex relay",
"full-duplex",
"single ant... | [
"cooperative communication",
"mimo systems",
"wireless telecommunication systems",
"fading (radio)",
"diversity gain",
"outage probability",
"orthogonal frequency division multiplexing",
"cooperative relay",
"transmit power",
"cooperative networks",
"outage performance",
"power constraints",
... |
195 | Given a language L and a nondeterministic finite automaton M , we consider whether we can determine efficiently (in the size of M) if M accepts at least one word in L, or infinitely many words. Given that M accepts at least one word in L, we consider how long the shortest word can be. The languages L that we examine in... | 2022-06-30T20:22:35.650Z | {
"ACL": null,
"DBLP": "journals/corr/abs-0711-3183",
"ArXiv": null,
"MAG": "135810796",
"CorpusId": "195",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/46e3696d20c84748d781cc9d7a8088e6fd378ff9 | Finite automata, palindromes, patterns, and borders | [
{
"authorId": "2068151009",
"name": "Terry Anderson"
},
{
"authorId": "1735273",
"name": "N. Rampersad"
},
{
"authorId": "1751477",
"name": "N. Santean"
},
{
"authorId": "1679162",
"name": "J. Shallit"
}
] | ArXiv | 2,007 | 39 | 3 | 0 | false | [
{
"category": "Mathematics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | null | {
"name": "ArXiv",
"volume": "abs/0711.3183",
"pages": null
} | [
"finite automata",
"nondeterministic finite automaton",
"finite automaton"
] | [
"finite automata",
"automata",
"finite automaton",
"automation",
"nondeterministic finite automaton"
] | [
"automation",
"nondeterministic finite automaton",
"finite automaton",
"finite automata",
"automata"
] | [
"engineering",
"translation (languages)",
"number of state",
"pipeline processing systems",
"automata theory",
"formal languages",
"computational linguistics",
"linguistics",
"program processors",
"formal languages and automata theory",
"database systems",
"parallel processing systems",
"mic... |
198 | One of the key concepts in testing is that of adequate test sets. A test selection criterion decides which test sets are adequate. In this paper, a language schema for specifying a large class of test selection criteria is developed; the schema is based on two operations for building complex criteria from simple ones. ... | 2022-06-20T13:02:27.929Z | {
"ACL": null,
"DBLP": "journals/corr/cs-SE-9912018",
"ArXiv": "cs/9912018",
"MAG": "2141853395",
"CorpusId": "198",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/d7583f927112b13e3e6716fda1e3f620498f47e7 | Computation in an algebra of test selection criteria | [
{
"authorId": "34959436",
"name": "J. Pachl"
},
{
"authorId": "1745839",
"name": "S. Zaks"
}
] | ArXiv | 1,999 | 14 | 0 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 1999-12-24T00:00:00 | {
"name": "ArXiv",
"volume": "cs.SE/9912018",
"pages": null
} | [
"test samples",
"efficient algorithm",
"genetic selection"
] | [
"relational schemas",
"database schemas",
"efficient algorithm",
"test case generation",
"test case selection"
] | [
"test case selection",
"database schemas",
"test samples",
"test case generation",
"efficient algorithm",
"genetic selection",
"relational schemas"
] | [
"software engineering",
"database systems",
"machine learning",
"computational efficiency",
"genetic analysis",
"relational data models",
"computer science",
"computer systems",
"artificial intelligence",
"theoretical computer science",
"bioinformatics",
"relational database",
"knowledge bas... |
201 | We show that the absolute worst case time complexity for Hopcroft's minimization algorithm applied to unary languages is reached only for de Bruijn words. A previous paper by Berstel and Carton gave the example of de Bruijn words as a language that requires O(n log n) steps by carefully choosing the splitting sets and ... | 2022-07-31T02:55:31.573Z | {
"ACL": null,
"DBLP": "journals/corr/abs-0705-1986",
"ArXiv": "0705.1986",
"MAG": "1588292369",
"CorpusId": "201",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/af573f1992e23d6e07d251b2b073e393fe481a7d | On the Hopcroft's minimization algorithm | [
{
"authorId": "143936370",
"name": "A. Paun"
}
] | ArXiv | 2,007 | 21 | 3 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 2007-05-14T00:00:00 | {
"name": "ArXiv",
"volume": "abs/0705.1986",
"pages": null
} | [
"automata"
] | [
"finite state automata",
"push-down automata",
"automata",
"optimization",
"adaptive algorithms"
] | [
"push-down automata",
"finite state automata",
"optimization",
"automata",
"adaptive algorithms"
] | [
"translation (languages)",
"finite automata",
"mathematics",
"formal languages",
"software",
"computational linguistics",
"automata theory",
"linguistics",
"formal languages and automata theory",
"computer science",
"database systems",
"theoretical computer science",
"computer systems"
] |
204 | High operating speed, fault tolerance (FT), low power and reconfiguration become today dominant issues during development and design of linear feedback shift registers (LFSRs), used as sequence generators, with randomness properties, in a process of testing complex CMOS VLSI ICs. In our design solution, we accomplish F... | 2022-08-20T13:43:20.511Z | {
"ACL": null,
"DBLP": "journals/jcsc/SavicSNPJ14",
"ArXiv": null,
"MAG": "2060553380",
"CorpusId": "204",
"PubMed": null,
"DOI": "10.1142/S0218126614500029",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/f9c8be897b494fc894588f2f5573237a98a39f12 | Reconfigurable Low Power Architecture for Fault Tolerant Pseudo-Random number Generation | [
{
"authorId": "2076487050",
"name": "N. Savic"
},
{
"authorId": "1796738",
"name": "M. Stojcev"
},
{
"authorId": "50547984",
"name": "T. Nikolic"
},
{
"authorId": "46560561",
"name": "V. Petrovic"
},
{
"authorId": "2004099",
"name": "G. Jovanovic"
}
] | J. Circuits Syst. Comput. | 2,014 | 26 | 5 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Engineering",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2014-02-05T00:00:00 | {
"name": "J. Circuits Syst. Comput.",
"volume": "23",
"pages": null
} | [
"hardware overheads",
"fault-tolerant",
"computer hardware",
"fault tolerance",
"single event upsets",
"low-power consumption",
"random number generators",
"low power",
"ip core",
"asic",
"pseudo-random numbers",
"fpga architectures",
"vlsi",
"linear feedback shift registers",
"shift reg... | [
"low power",
"low-power consumption",
"fault-tolerant",
"random numbers",
"random number generators",
"random number generation",
"linear feedback shift registers",
"shift registers",
"vlsi",
"triple modular redundancy",
"computer hardware",
"clock gating",
"field programmable gate array",
... | [
"single event upsets",
"low power",
"ip core",
"pseudo-random numbers",
"fault tolerance",
"fault-tolerant",
"low-power consumption",
"asic",
"architecture designs",
"linear feedback shift registers",
"hardware overheads",
"computer hardware",
"random numbers",
"soft error",
"shift regis... | [
"static random access storage",
"computer control systems",
"programmable logic controllers",
"software quality",
"fault tolerant computer systems",
"electric power supplies to apparatus",
"software architecture",
"stream ciphers",
"built-in self test",
"computer science",
"computer aided design... |
206 | Artificial life models, swarm intelligent and evolutionary computation algorithms are usually built on fixed size populations. Some studies indicate however that varying the population size can increase the adaptability of these systems and their capability to react to changing environments. In this paper we present an... | 2022-09-02T02:27:53.424Z | {
"ACL": null,
"DBLP": "journals/corr/abs-cs-0512004",
"ArXiv": "cs/0512004",
"MAG": "1639612572",
"CorpusId": "206",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/a04b31e8d08e46d00a043c82ec8093f5a39ec6e4 | Self-Regulated Artificial Ant Colonies on Digital Image Habitats | [
{
"authorId": "144784322",
"name": "C. Fernandes"
},
{
"authorId": "144548853",
"name": "Vitorino Ramos"
},
{
"authorId": "145881692",
"name": "A. Rosa"
}
] | ArXiv | 2,005 | 15 | 51 | 1 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2005-11-30T00:00:00 | {
"name": "ArXiv",
"volume": "abs/cs/0512004",
"pages": null
} | [
"mathematical morphology",
"pattern recognition",
"digital image",
"water-shed algorithm",
"cognitive maps",
"evolutionary computation",
"swarm intelligence",
"population structure",
"image processing"
] | [
"digital image",
"evolutionary computation",
"swarm intelligence",
"mathematical morphology",
"water-shed algorithm",
"image processing",
"pattern recognition",
"cognitive maps"
] | [
"mathematical morphology",
"pattern recognition",
"digital image",
"water-shed algorithm",
"cognitive maps",
"evolutionary computation",
"swarm intelligence",
"population structure",
"image processing"
] | [
"image segmentation",
"machine learning",
"image analysis",
"fuzzy cognitive map",
"evolutionary algorithms",
"artificial intelligence",
"population genetics",
"computer imaging and vision",
"cognitive systems",
"conformal mapping",
"genetic algorithms",
"computer science",
"gene frequency",... |
210 | We propose a very simple randomised data structure that stores an approximation from above of a lattice-valued function. Computing the function value requires a constant number of steps, and the error probability can be balanced with space usage, much like in Bloom filters. The structure is particularly well suited for... | 2022-08-27T18:05:51.897Z | {
"ACL": null,
"DBLP": "journals/corr/cs-DS-0306046",
"ArXiv": "cs/0306046",
"MAG": "1665662095",
"CorpusId": "210",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/62c192d8893d4c6b7a55ff4ef42c822aa9145631 | Compact Approximation of Lattice Functions with Applications to Large-Alphabet Text Search | [
{
"authorId": "1733343",
"name": "P. Boldi"
},
{
"authorId": "1737624",
"name": "S. Vigna"
}
] | ArXiv | 2,003 | 21 | 1 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2003-06-11T00:00:00 | {
"name": "ArXiv",
"volume": "cs.DS/0306046",
"pages": null
} | [
"software",
"probability",
"http"
] | [
"probability",
"software",
"http",
"approximation scheme",
"text document"
] | [
"approximation scheme",
"probability",
"http",
"software",
"text document"
] | [
"polynomial approximation",
"approximation algorithms",
"mathematics",
"servers",
"client server computer systems",
"internet protocols",
"computer science",
"text mining",
"information retrieval systems",
"graph theory",
"approximation theory",
"world wide web",
"security of data",
"telec... |
219 | Objective: The objective was to use eye tracking to trace the underlying changes in attention allocation associated with the performance effects of clutter, stress, and task difficulty in visual search and noticing tasks. Background: Clutter can degrade performance in complex domains, yet more needs to be known about t... | 2022-08-26T11:11:15.732Z | {
"ACL": null,
"DBLP": "journals/hf/MoacdiehS15a",
"ArXiv": null,
"MAG": "2136552552",
"CorpusId": "219",
"PubMed": "25850110",
"DOI": "10.1177/0018720814564594",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/ef207ac1e4a970db539dedb2c3eb8f29aebe4581 | Clutter in Electronic Medical Records | [
{
"authorId": "2054926",
"name": "N. Moacdieh"
},
{
"authorId": "1682002",
"name": "N. Sarter"
}
] | Hum. Factors | 2,015 | 50 | 30 | 1 | false | [
{
"category": "Medicine",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Medicine",
"source": "external"
}
] | [
"JournalArticle"
] | 2015-01-05T00:00:00 | {
"name": "Human Factors: The Journal of Human Factors and Ergonomics Society",
"volume": "57",
"pages": "591 - 606"
} | [
"clutter (information theory)",
"background clutter"
] | [
"clutter (information theory)",
"clutter background",
"ground clutter",
"background clutter",
"clutter suppression",
"health records",
"ehr",
"display system"
] | [
"clutter (information theory)",
"health records",
"ground clutter",
"background clutter",
"clutter background",
"ehr",
"clutter suppression",
"display system"
] | [
"radar",
"records management",
"object detection",
"target tracking",
"object recognition",
"information systems",
"space time adaptive processing",
"radar systems",
"display devices",
"signal processing",
"computer hardware",
"medical computing",
"sensors",
"pattern recognition",
"image... |
220 | We present a new framework for the crucial challenge of self-organization of a large sensor network. The basic scenario can be described as follows: Given a large swarm of immobile sensor nodes that have been scattered in a polygonal region, such as a street network. Nodes have no knowledge of size or shape of the envi... | 2022-09-05T02:58:34.635Z | {
"ACL": null,
"DBLP": "journals/corr/abs-cs-0510048",
"ArXiv": "cs/0510048",
"MAG": "2056762216",
"CorpusId": "220",
"PubMed": null,
"DOI": "10.1145/1109557.1109668",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/da1fac9fdcf44c6db7db08f08acf9186e326d66d | Deterministic boundary recognition and topology extraction for large sensor networks | [
{
"authorId": "1750993",
"name": "A. Kröller"
},
{
"authorId": "1707693",
"name": "S. Fekete"
},
{
"authorId": "3345801",
"name": "D. Pfisterer"
},
{
"authorId": "145160227",
"name": "S. Fischer"
}
] | SODA '06 | 2,005 | 20 | 208 | 10 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 2005-10-17T00:00:00 | {
"name": "ArXiv",
"volume": "abs/cs/0510048",
"pages": null
} | [
"sensor nodes",
"routing algorithms",
"deterministic",
"topology",
"distributed algorithm",
"communication",
"sensor networks"
] | [
"deterministic",
"topology",
"sensors",
"sensor networks",
"wireless sensor networks",
"sensor nodes",
"communication",
"routing algorithms"
] | [
"sensor nodes",
"communication",
"deterministic",
"topology",
"wireless sensor networks",
"sensors",
"distributed algorithm",
"routing algorithms",
"sensor networks"
] | [
"stochastic",
"wireless communications",
"energy utilization",
"computer hardware",
"parallel algorithms",
"computer networks",
"routers",
"wireless telecommunication systems",
"embedded systems",
"stochastic processes",
"stochasticity",
"electricity",
"computer science",
"parallel process... |
225 | We present a new characterization of termination of general logic programs. Most existing termination analysis approaches rely on some static information about the structure of the source code of a logic program, such as modes/types, norms/level mappings, models/interargument relations, and the like. We propose a dynam... | 2022-09-01T22:14:14.304Z | {
"ACL": null,
"DBLP": "journals/tocl/ShenYYSY03",
"ArXiv": "cs/0204031",
"MAG": "1976132254",
"CorpusId": "225",
"PubMed": null,
"DOI": "10.1145/937555.937556",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/b4e3434ea0088171405093fa257722bef0a6060e | A dynamic approach to characterizing termination of general logic programs | [
{
"authorId": "1744468",
"name": "Yi-Dong Shen"
},
{
"authorId": "2887414",
"name": "Jia-Huai You"
},
{
"authorId": "38410481",
"name": "Li-Yan Yuan"
},
{
"authorId": "27284588",
"name": "S. S. Shen"
},
{
"authorId": "152290618",
"name": "Qiang Yang"
}
] | TOCL | 2,002 | 36 | 22 | 4 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2002-04-12T00:00:00 | {
"name": "ArXiv",
"volume": "cs.LO/0204031",
"pages": null
} | [
"logic programs",
"termination analysis",
"source codes"
] | [
"logic programs",
"termination analysis",
"source codes",
"answer set semantics",
"dynamic logic",
"multivalued logic",
"stable model",
"disjunctive logic programs",
"well founded semantics"
] | [
"disjunctive logic programs",
"source codes",
"logic programs",
"dynamic logic",
"well founded semantics",
"termination analysis",
"stable model",
"answer set semantics",
"multivalued logic"
] | [
"answer set programming",
"software engineering",
"logic programming",
"modal logic",
"answer set",
"many valued logics",
"knowledge representation",
"computer science",
"computer programming languages",
"formal logic",
"logic gates",
"logic design",
"boolean functions",
"knowledge based s... |
233 | In this second part of our two-part paper, we consider the capacity analysis for wireless mobile systems with multiple-antenna architectures. We apply the results of the first part to a commonly known baseband, discrete-time multiple-antenna system where both the transmitter and receiver know the channel's statistical ... | 2022-08-31T19:00:02.193Z | {
"ACL": null,
"DBLP": "journals/corr/cs-IT-0411012",
"ArXiv": "cs/0411012",
"MAG": "2114087588",
"CorpusId": "233",
"PubMed": null,
"DOI": "10.1109/TIT.2005.853327",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/c29ce990cafac387a6c72288deef9b06086cda14 | Capacity analysis for continuous alphabet channels with side information, part II: MIMO channels | [
{
"authorId": "1716627",
"name": "M. Fozunbal"
},
{
"authorId": "1721818",
"name": "S. McLaughlin"
},
{
"authorId": "2062753594",
"name": "R. W. Schafer"
}
] | IEEE Transactions on Information Theory | 2,004 | 45 | 6 | 0 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Business",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 2004-11-06T00:00:00 | {
"name": "IEEE Transactions on Information Theory",
"volume": "51",
"pages": "3086-3101"
} | [
"transmitters",
"partial csi",
"discrete-time",
"csi",
"mimo channel",
"white gaussian noise",
"mobile systems",
"wireless",
"awgn",
"rician fading",
"channel state information",
"fading channels"
] | [
"mimo",
"mimo channel",
"wireless",
"mobile systems",
"multiple antenna",
"antennas",
"antenna systems",
"discrete-time",
"transmitters",
"white gaussian noise",
"gaussian noise (electronic)",
"awgn",
"gaussians",
"rayleigh fading",
"channel state",
"channel state information",
"csi"... | [
"transmitters",
"partial csi",
"gaussian noise (electronic)",
"discrete-time",
"csi",
"antennas",
"mimo",
"mimo channel",
"rayleigh fading",
"white gaussian noise",
"channel state",
"mobile systems",
"wireless",
"multiple antenna",
"awgn",
"rician fading",
"gaussians",
"channel sta... | [
"signal receivers",
"signal to noise ratio",
"discrete time control systems",
"wireless telecommunication systems",
"orthogonal frequency division multiplexing",
"mim devices",
"channel capacity",
"mimo systems",
"matrix algebra",
"white noise",
"wireless networks",
"state feedback",
"channe... |
235 | A hypermedia application offers its users much freedom to navigate through a large hyperspace. Adaptive hypermedia (AH) offers personalized content, presentation, and navigation support. Many adaptive hypermedia systems (AHS) are tightly integrated with one specific application and/or use a limited number of techniques... | 2022-09-05T02:12:37.001Z | {
"ACL": null,
"DBLP": "journals/nrhm/KnutovBP09",
"ArXiv": null,
"MAG": "2128211639",
"CorpusId": "235",
"PubMed": null,
"DOI": "10.1080/13614560902801608",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/aa19d2316b62c6a75f812c653f182d52f8599e08 | AH 12 years later: a comprehensive survey of adaptive hypermedia methods and techniques | [
{
"authorId": "1707305",
"name": "E. Knutov"
},
{
"authorId": "1831425",
"name": "P. D. Bra"
},
{
"authorId": "1691997",
"name": "Mykola Pechenizkiy"
}
] | New Rev. Hypermedia Multim. | 2,009 | 117 | 232 | 22 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Review"
] | 2009-04-01T00:00:00 | {
"name": "New Review of Hypermedia and Multimedia",
"volume": "15",
"pages": "38 - 5"
} | [
"hypermedia",
"adaptive hypermedia systems",
"hypermedia systems",
"adaptive hypermedia",
"adaptive systems"
] | [
"adaptive hypermedia",
"adaptive hypermedia systems",
"hypermedia",
"hypermedia systems",
"hypertext",
"adaptive systems"
] | [
"hypermedia",
"adaptive hypermedia systems",
"hypermedia systems",
"adaptive hypermedia",
"adaptive systems",
"hypertext"
] | [
"hypertext systems",
"user interfaces",
"e-learning",
"architecture types",
"information retrieval systems",
"world wide web",
"human computer interaction",
"information systems",
"education",
"software architecture",
"database systems",
"information retrieval",
"internet",
"computer scien... |
237 | Data-intensive computing has positioned itself as a valuable programming paradigm to efficiently approach problems requiring processing very large volumes of data. This paper presents a pilot study about how to apply the data-intensive computing paradigm to evolutionary computation algorithms. Two representative cases ... | 2022-09-02T06:10:23.215Z | {
"ACL": null,
"DBLP": "conf/gecco/Llora09",
"ArXiv": null,
"MAG": "2095687898",
"CorpusId": "237",
"PubMed": null,
"DOI": "10.1145/1569901.1570087",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/00dc41f2abbd4145d8bb7cf3452ab1d4dcbc54ad | Data-intensive computing for competent genetic algorithms: a pilot study using meandre | [
{
"authorId": "1822628",
"name": "Xavier Llorà"
}
] | GECCO | 2,009 | 36 | 13 | 1 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"Book",
"JournalArticle",
"Conference"
] | 2009-07-08T00:00:00 | {
"name": "Proceedings of the 11th Annual conference on Genetic and evolutionary computation",
"volume": null,
"pages": null
} | [
"distribution algorithms",
"evolutionary computation",
"genetic algorithms",
"computing paradigm"
] | [
"genetic algorithms",
"evolutionary programming",
"computing paradigm",
"evolutionary computation",
"distribution algorithms",
"multi core",
"programming languages",
"evolutionary algorithms",
"evolutionary computation techniques",
"adaptive algorithms",
"efficient algorithm",
"optimization pr... | [
"evolutionary algorithms",
"genetic algorithms",
"programming languages",
"optimization problems",
"evolutionary computation techniques",
"evolutionary computation",
"efficient algorithm",
"computing paradigm",
"adaptive algorithms",
"distribution algorithms",
"multi core",
"evolutionary progr... | [
"artificial intelligence",
"computer programming languages",
"linguistics",
"correlation analysis",
"genetic programming",
"particle swarm optimization (pso)",
"computational efficiency",
"grid computing",
"cloud computing",
"software",
"estimation of distribution algorithms",
"program process... |
242 | The large majority of commercially available multiple-input multiple-output (MIMO) radio channel measurement devices (sounders) is based on time-division multiplexed switching (TDMS) of a single transmit/receive radio frequency chain into the elements of a transmit/receive antenna array. While being cost-effective, suc... | 2022-09-03T05:00:50.575Z | {
"ACL": null,
"DBLP": "journals/tit/BaumB11",
"ArXiv": "0709.1441",
"MAG": "2131773789",
"CorpusId": "242",
"PubMed": null,
"DOI": "10.1109/TIT.2011.2165129",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/636503a0bec74d22ee0cebccdd8ac36ac78d3614 | Information-Theoretic Analysis of MIMO Channel Sounding | [
{
"authorId": "1865519",
"name": "D. Baum"
},
{
"authorId": "1691809",
"name": "H. Bölcskei"
}
] | IEEE Transactions on Information Theory | 2,007 | 90 | 17 | 0 | true | [
{
"category": "Business",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 2007-09-10T00:00:00 | {
"name": "IEEE Transactions on Information Theory",
"volume": "57",
"pages": "7555-7577"
} | [
"local oscillators",
"receive antenna",
"mimo",
"mimo channel",
"physical channels",
"phase noise",
"antenna arrays",
"channel measurements",
"radio channels",
"frequency offsets",
"channel capacity",
"radio",
"multiple-input-multiple-output"
] | [
"mimo",
"radio channels",
"radio",
"antennas",
"antenna arrays",
"phase noise",
"frequency offsets",
"local oscillators",
"channel capacity"
] | [
"local oscillators",
"receive antenna",
"antennas",
"mimo",
"mimo channel",
"multiple-input-multiple-output",
"physical channels",
"phase noise",
"antenna arrays",
"channel measurements",
"radio channels",
"channel capacity",
"radio",
"frequency offsets"
] | [
"receiving antennas",
"wireless telecommunication systems",
"orthogonal frequency division multiplexing",
"mim devices",
"fading channels",
"mimo systems",
"matrix algebra",
"communication channels",
"virtual channels",
"spurious signal noise",
"signal to noise ratio",
"ultra-wideband (uwb)",
... |
247 | Constraint Programming (CP)[1] has been successfully appl ied to both constraint satisfaction and constraint optimization prob lems. A wide variety of specialized global constraints provide critical assistan ce i achieving a good model that can take advantage of the structure of the problem in the search for a solution... | 2022-09-03T03:47:49.290Z | {
"ACL": null,
"DBLP": "journals/corr/abs-cs-0702170",
"ArXiv": "cs/0702170",
"MAG": null,
"CorpusId": "247",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/a005c83193a5cdd06052e685a2cd716ef49a44b4 | Generic Global Constraints based on MDDs | [
{
"authorId": "93489491",
"name": "Peter Tiedemann"
},
{
"authorId": "30443435",
"name": "H. Andersen"
},
{
"authorId": "1801719",
"name": "R. Pagh"
}
] | ArXiv | 2,007 | 22 | 0 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2007-02-28T00:00:00 | {
"name": "ArXiv",
"volume": "abs/cs/0702170",
"pages": null
} | [
"decision diagram",
"optimization problems",
"constraint programming"
] | [
"decision diagram",
"constraint programming",
"optimization problems",
"optimization",
"detection algorithm"
] | [
"optimization",
"constraint programming",
"decision diagram",
"detection algorithm",
"optimization problems"
] | [
"mathematics",
"computer programming",
"binary decision diagrams",
"signal detection",
"correlation analysis",
"computer science",
"decision theory",
"finite automata",
"logic design",
"boolean functions",
"signal processing",
"artificial intelligence",
"automata theory",
"field programmab... |
252 | The paper gives a brief review of the expectation-maximization algorithm (Dempster 1977) in the comprehensible framework of discrete mathematics. In Section 2, two prominent estimation methods, the relative-frequency estimation and the maximum-likelihood estimation are presented. Section 3 is dedicated to the expectati... | 2022-09-04T08:32:18.749Z | {
"ACL": null,
"DBLP": "journals/corr/abs-cs-0412015",
"ArXiv": "cs/0412015",
"MAG": "1765214094",
"CorpusId": "252",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/45f80e5bf39d499848fa801d930b004ada866087 | A Tutorial on the Expectation-Maximization Algorithm Including Maximum-Likelihood Estimation and EM Training of Probabilistic Context-Free Grammars | [
{
"authorId": "2694275",
"name": "D. Prescher"
}
] | ArXiv | 2,004 | 32 | 36 | 2 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Review"
] | 2004-12-03T00:00:00 | {
"name": "ArXiv",
"volume": "abs/cs/0412015",
"pages": null
} | [
"estimation method",
"maximum likelihood estimation",
"context-free",
"mathematics",
"dempster"
] | [
"maximum likelihood",
"maximum likelihood estimator",
"maximum likelihood estimation",
"estimation method",
"dempster",
"mathematics",
"frequency estimation"
] | [
"estimation method",
"maximum likelihood estimator",
"maximum likelihood",
"frequency estimation",
"maximum likelihood estimation",
"context-free",
"mathematics",
"dempster"
] | [
"numerical model",
"likelihood functions",
"frequency allocation",
"context free languages",
"combination rules",
"sensor data fusion",
"correlation analysis",
"communication channels",
"telecommunication traffic",
"data communication systems",
"automata theory",
"formal languages",
"dempste... |
256 | Beyond the local constraints imposed by grammar, words concatenated in long sequences carrying a complex message show statistical regularities that may reflect their linguistic role in the message. In this paper, we perform a systematic statistical analysis of the use of words in literary English corpora. We show that ... | 2022-09-05T01:13:31.631Z | {
"ACL": null,
"DBLP": "journals/corr/cond-mat-0109218",
"ArXiv": "cond-mat/0109218",
"MAG": "1604188556",
"CorpusId": "256",
"PubMed": null,
"DOI": "10.1142/S0219525902000493",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/d95b4e275d71ac1a1172d02346b1edb388d91b1a | Entropic Analysis of the Role of Words in Literary Texts | [
{
"authorId": "2245726",
"name": "M. Montemurro"
},
{
"authorId": "2320797",
"name": "D. Zanette"
}
] | Adv. Complex Syst. | 2,001 | 18 | 47 | 1 | true | [
{
"category": "Linguistics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Physics",
"source": "external"
}
] | [
"JournalArticle"
] | 2001-09-12T00:00:00 | {
"name": "ArXiv",
"volume": "cond-mat/0109218",
"pages": null
} | [
"linguistics",
"probability distributions",
"correlation analysis",
"syntactic structure"
] | [
"correlation analysis",
"syntactic structure",
"linguistics",
"probability",
"probability distributions",
"syntactics"
] | [
"correlation analysis",
"syntactic structure",
"linguistics",
"probability distributions",
"probability",
"syntactics"
] | [
"mathematics",
"natural language processing",
"computational linguistics",
"artificial intelligence",
"natural languages",
"database systems",
"computer science",
"semantics",
"computer systems"
] |
262 | We study the complexity of robust quantum algorithms. These still work with high probability if the n input bits are noisy. We exhibit a robust quantum algorithm that recovers the complete input with high probability using O(n) queries. This implies that every n-bit function can be quantum computed robustly with O(n) q... | 2022-09-04T11:09:23.618Z | {
"ACL": null,
"DBLP": "journals/corr/quant-ph-0309220",
"ArXiv": null,
"MAG": "2116377806",
"CorpusId": "262",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/25a8bac13298c25887dbad3a38a65fbce900951a | Robust Quantum Algorithms and Polynomials | [
{
"authorId": "1747509",
"name": "H. Buhrman"
},
{
"authorId": "145512400",
"name": "I. Newman"
},
{
"authorId": "1721834",
"name": "H. Röhrig"
},
{
"authorId": "1863449",
"name": "R. D. Wolf"
}
] | ArXiv | 2,003 | 9 | 18 | 2 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Economics",
"source": "external"
},
{
"category": "Mathematics",
"so... | [
"JournalArticle"
] | null | {
"name": "ArXiv",
"volume": "quant-ph/0309220",
"pages": null
} | [
"boolean functions",
"probability"
] | [
"probability",
"boolean functions",
"parity bits",
"adaptive algorithms",
"quantum gates"
] | [
"boolean functions",
"parity bits",
"probability",
"quantum gates",
"adaptive algorithms"
] | [
"mathematics",
"turbo codes",
"distributed video coding",
"wyner-ziv",
"logic gates",
"software",
"quadrature amplitude modulation",
"signal encoding",
"low-density parity-check codes",
"convolutional codes",
"code division multiple access",
"additive white gaussian noise",
"data communicati... |
266 | We describe our software package Block Locally Optimal Preconditioned Eigenvalue Xolvers (BLOPEX) recently publicly released. BLOPEX is available as a stand-alone serial library, as an external package to PETSc (Portable, Extensible Toolkit for Scientific Computation, a general purpose suite of tools developed by Argon... | 2022-09-05T00:37:29.060Z | {
"ACL": null,
"DBLP": "journals/siamsc/KnyazevALO07",
"ArXiv": "0705.2626",
"MAG": "3102398037",
"CorpusId": "266",
"PubMed": null,
"DOI": "10.1137/060661624",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/11bd8ba186e461298e51bab9f2f70621dd1d560b | Block Locally Optimal Preconditioned Eigenvalue Xolvers (BLOPEX) in hypre and PETSc | [
{
"authorId": "2395242",
"name": "A. Knyazev"
},
{
"authorId": "2707372",
"name": "M. Argentati"
},
{
"authorId": "2225401",
"name": "I. Lashuk"
},
{
"authorId": "2863169",
"name": "E. Ovtchinnikov"
}
] | SIAM J. Sci. Comput. | 2,007 | 75 | 88 | 5 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 2007-05-17T00:00:00 | {
"name": "SIAM J. Sci. Comput.",
"volume": "29",
"pages": "2224-2239"
} | [
"preconditioners",
"shared memories",
"libraries",
"linear systems",
"software",
"general purpose",
"eigenvalue problem",
"partial differential equations",
"eigenvalues"
] | [
"eigenvalues",
"software",
"libraries",
"general purpose",
"partial differential equations",
"differential equations",
"preconditioners",
"iterative solvers",
"eigenvalue problem",
"linear systems"
] | [
"preconditioners",
"shared memories",
"differential equations",
"libraries",
"linear systems",
"software",
"general purpose",
"eigenvalue problem",
"partial differential equations",
"iterative solvers",
"eigenvalues"
] | [
"numerical methods",
"program processors",
"parallel architectures",
"education",
"matrix algebra",
"computer science",
"eigenvalues and eigenfunctions",
"mathematics",
"parallel processing systems",
"microprocessor chips",
"distributed systems",
"computer hardware",
"distributed computer sy... |
268 | We present a robot localization system using biologically-inspired vision. Our system models two extensively studied human visual capabilities: (1) extracting the "gist" of a scene to produce a coarse localization hypothesis, and (2) refining it by locating salient landmark regions in the scene. Gist is computed here a... | 2022-09-03T07:56:08.560Z | {
"ACL": null,
"DBLP": "conf/iros/SiagianI07",
"ArXiv": null,
"MAG": "2097989758",
"CorpusId": "268",
"PubMed": null,
"DOI": "10.1109/IROS.2007.4399349",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/9b9e54d5dff153b92c336fbdfcdd66823dbb5b91 | Biologically-inspired robotics vision monte-carlo localization in the outdoor environment | [
{
"authorId": "1973892",
"name": "Christian Siagian"
},
{
"authorId": "7326223",
"name": "L. Itti"
}
] | 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems | 2,007 | 70 | 66 | 4 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 2007-12-10T00:00:00 | {
"name": "2007 IEEE/RSJ International Conference on Intelligent Robots and Systems",
"volume": null,
"pages": "1723-1730"
} | [
"monte carlo localization",
"localization algorithm",
"localization system",
"robots",
"robotics",
"robot localization"
] | [
"robotics",
"localization algorithm",
"localization system",
"robots",
"robot localization",
"localization technique",
"correlation analysis",
"reference image",
"color images",
"digital image"
] | [
"monte carlo localization",
"localization technique",
"localization system",
"robots",
"localization algorithm",
"correlation analysis",
"digital image",
"reference image",
"robotics",
"robot localization",
"color images"
] | [
"robot applications",
"wireless sensor networks",
"mathematics",
"image analysis",
"image processing",
"image matching",
"image quality",
"computer science",
"pattern recognition",
"color image processing",
"mobile robots",
"wireless communications",
"energy utilization",
"sensor nodes",
... |
271 | Finding low-weight multiples of a binary polynomial is a difficult problem arising in the context of stream ciphers cryptanalysis. The best algorithms to solve this problem are based on a time memory tradeoff. Staying in this category, we will present a new approach using discrete logarithm rather than a direct represe... | 2022-09-01T07:51:32.334Z | {
"ACL": null,
"DBLP": "journals/corr/abs-cs-0701069",
"ArXiv": "cs/0701069",
"MAG": "2054488092",
"CorpusId": "271",
"PubMed": null,
"DOI": "10.1109/ISIT.2007.4557360",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/8699286ffc89936f446c1241222796634c6981b9 | Finding low-weight polynomial multiples using discrete logarithm | [
{
"authorId": "144813989",
"name": "F. Didier"
},
{
"authorId": "1403645251",
"name": "Yann Laigle-Chapuy"
}
] | 2007 IEEE International Symposium on Information Theory | 2,007 | 15 | 16 | 1 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 2007-01-10T00:00:00 | {
"name": "2007 IEEE International Symposium on Information Theory",
"volume": null,
"pages": "1036-1040"
} | [
"discrete logarithms",
"stream ciphers",
"cryptanalysis"
] | [
"discrete logarithms",
"stream ciphers",
"cryptosystems",
"cryptanalysis",
"differential cryptanalysis"
] | [
"cryptosystems",
"discrete logarithms",
"differential cryptanalysis",
"cryptanalysis",
"stream ciphers"
] | [
"public key cryptography",
"electronic document identification systems",
"lyapunov methods",
"block ciphers",
"authentication",
"cryptology",
"security of data",
"cryptography",
"network security",
"lyapunov exponent",
"riccati equations",
"time-varying delay",
"lyapunov stability theory",
... |
272 | Search engine companies collect the "database of intentions", the histories of their users' search queries. These search logs are a gold mine for researchers. Search engine companies, however, are wary of publishing search logs in order not to disclose sensitive information. In this paper we analyze algorithms for publ... | 2022-09-05T00:20:14.013Z | {
"ACL": null,
"DBLP": "journals/corr/abs-0904-0682",
"ArXiv": "0904.0682",
"MAG": "1560221996",
"CorpusId": "272",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/7e6978893d85657d7a87247a63a9d25e11ecac66 | Privacy in Search Logs | [
{
"authorId": "48908513",
"name": "M. Götz"
},
{
"authorId": "2357165",
"name": "Ashwin Machanavajjhala"
},
{
"authorId": "1920325",
"name": "Guozhang Wang"
},
{
"authorId": "33285410",
"name": "Xiaokui Xiao"
},
{
"authorId": "143614516",
"name": "J. Gehrke"
... | ArXiv | 2,009 | 42 | 34 | 2 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2009-04-03T00:00:00 | {
"name": "ArXiv",
"volume": "abs/0904.0682",
"pages": null
} | [
"sensitive informations",
"search queries",
"privacy",
"search engines",
"anonymity",
"database systems",
"keyword queries"
] | [
"privacy",
"search engines",
"engine",
"database systems",
"search queries",
"anonymity",
"individual privacy",
"unlinkability",
"anonymous communication"
] | [
"sensitive informations",
"search queries",
"privacy",
"search engines",
"individual privacy",
"anonymity",
"unlinkability",
"anonymous communication",
"database systems",
"keyword queries",
"engine"
] | [
"access control",
"network security",
"web searches",
"computer security",
"world wide web",
"privacy preserving",
"authentication",
"electronic document identification systems",
"communication",
"communication systems",
"computer systems",
"query processing",
"keyword search",
"engineerin... |
274 | Helium dilution maneuver is used to determine the functional residual capacity (FRC) 14 newborns ages 1-5 mo. The model equation describes the changing alveolar fractions of He and the ventilation promoted by a rebreathing procedure that does not exceed 40 s. The model does not involve the volume of the rebreathing bag... | 2022-02-13T16:01:25.266Z | {
"ACL": null,
"DBLP": "journals/tbe/BouferracheKLFL01",
"ArXiv": null,
"MAG": "2155590642",
"CorpusId": "274",
"PubMed": "11442296",
"DOI": "10.1109/10.930909",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/05073be97ae0f27fa92f168c48d4f11af77d4565 | Measurement of functional residual capacity through the transient phase of He dilution in newborns | [
{
"authorId": "2079921336",
"name": "B. Bouferrache"
},
{
"authorId": "2764908",
"name": "G. Krim"
},
{
"authorId": "145311340",
"name": "A. Léké"
},
{
"authorId": "2532431",
"name": "M. Freville"
},
{
"authorId": "50480467",
"name": "J. Libert"
}
] | IEEE Transactions on Biomedical Engineering | 2,001 | 45 | 0 | 0 | false | [
{
"category": "Medicine",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Medicine",
"source": "external"
}
] | [
"JournalArticle"
] | 2001-07-01T00:00:00 | {
"name": "IEEE Transactions on Biomedical Engineering",
"volume": "48",
"pages": "834-838"
} | [] | [
"biometrics",
"transmission capacities",
"channel capacity",
"hierarchical model",
"differential equations"
] | [
"biometrics",
"transmission capacities",
"hierarchical model",
"channel capacity",
"differential equations"
] | [
"access control",
"ad hoc networks",
"multiplexing",
"hierarchical system",
"communication channels",
"signal to noise ratio",
"information theory",
"numerical methods",
"computer security",
"routers",
"mobile telecommunication systems",
"internet protocols",
"quality of service",
"wireles... |
275 | This paper investigates point-to-point information transmission over a wideband slow-fading channel, modeled as an (asymptotically) large number of independent identically distributed parallel channels, with the random channel fading realizations remaining constant over the entire coding block. On the one hand, in the ... | 2022-09-04T02:09:27.064Z | {
"ACL": null,
"DBLP": "journals/corr/abs-0710-0291",
"ArXiv": "0710.0291",
"MAG": "1485554924",
"CorpusId": "275",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/59f008bf9bef03eb08a34565f3204294b69cb665 | On Outage Behavior of Wideband Slow-Fading Channels | [
{
"authorId": "50550029",
"name": "Wenyi Zhang"
},
{
"authorId": "144172505",
"name": "U. Mitra"
}
] | ArXiv | 2,007 | 25 | 5 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 2007-09-30T00:00:00 | {
"name": "ArXiv",
"volume": "abs/0710.0291",
"pages": null
} | [
"transmitters",
"random variables",
"bandwidth",
"power allocations",
"deterministic",
"wide-band",
"probability",
"channel state",
"state feedback",
"outages",
"transmit power",
"channel state information",
"outage probability"
] | [
"outages",
"outage probability",
"wide-band",
"fading channels",
"random variables",
"probability",
"deterministic",
"transmitters",
"channel state",
"channel state information",
"power allocations",
"state feedback",
"transmit power"
] | [
"transmitters",
"random variables",
"bandwidth",
"power allocations",
"deterministic",
"wide-band",
"probability",
"channel state",
"state feedback",
"outages",
"channel state information",
"transmit power",
"outage probability",
"fading channels"
] | [
"signal receivers",
"antennas",
"random processes",
"probability distributions",
"computer networks",
"wireless telecommunication systems",
"stochastic",
"mathematics",
"wireless networks",
"channel estimation",
"feedback control",
"linear matrix inequalities",
"fading (radio)",
"rayleigh ... |
280 | The probability of observing x/sub t/ at time t, given past observations x/sub 1/...x/sub t-1/ can be computed if the true generating distribution /spl mu/ of the sequences x/sub 1/x/sub 2/x/sub 3/... is known. If /spl mu/ is unknown, but known to belong to a class /spl Mscr/ one can base one's prediction on the Bayes ... | 2022-09-02T13:39:29.154Z | {
"ACL": null,
"DBLP": "journals/corr/cs-LG-0301014",
"ArXiv": "cs/0301014",
"MAG": "2148257033",
"CorpusId": "280",
"PubMed": null,
"DOI": "10.1109/TIT.2003.814488",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/a8117aeff722b3dfea783d7a13afffe895ed5136 | Convergence and Loss Bounds for Bayesian Sequence Prediction | [
{
"authorId": "144154444",
"name": "Marcus Hutter"
}
] | IEEE Trans. Inf. Theory | 2,003 | 31 | 35 | 2 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Physics",
"source": "s2-fos-model"
},
{
"category": "Mathematics",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2003-01-16T00:00:00 | {
"name": "IEEE Trans. Inf. Theory",
"volume": "49",
"pages": "2061-2067"
} | [
"bayesian methods",
"probability"
] | [
"bayesian methods",
"probability",
"software product line",
"product lines",
"variability management"
] | [
"bayesian methods",
"probability",
"variability management",
"software product line",
"product lines"
] | [
"artificial intelligence",
"mathematics",
"software product line engineerings",
"computer software reusability",
"network architecture",
"model checking",
"functional requirement",
"computer science",
"software design",
"object oriented programming",
"computer programming languages",
"computer... |
285 | Cluster analysis often serves as the initial step in the process of data classification. In this paper, the problem of clustering different length input data is considered. The edit distance as the minimum number of elementary edit operations needed to transform one vector into another is used. A heuristic for clusteri... | 2022-06-20T11:49:33.219Z | {
"ACL": null,
"DBLP": "journals/corr/cs-IR-0304007",
"ArXiv": "cs/0304007",
"MAG": "1484164834",
"CorpusId": "285",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/8403e33f189c2b5d6c789965738ca5d68ed6462f | A Method for Clustering Web Attacks Using Edit Distance | [
{
"authorId": "144897828",
"name": "S. Petrovic"
},
{
"authorId": "2054378117",
"name": "Gonzalo Álvarez"
}
] | ArXiv | 2,003 | 14 | 2 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2003-04-03T00:00:00 | {
"name": "ArXiv",
"volume": "cs.IR/0304007",
"pages": null
} | [
"k-means algorithm",
"clustering algorithms",
"cluster analysis"
] | [
"clustering algorithms",
"cluster analysis",
"classification models",
"clustering methods",
"hier-archical clustering"
] | [
"k-means algorithm",
"classification models",
"clustering algorithms",
"clustering methods",
"cluster analysis",
"hier-archical clustering"
] | [
"classification methods",
"data mining",
"machine learning",
"hierarchical system",
"computer systems",
"computer science",
"artificial intelligence"
] |
286 | Email has emerged as a dominant form of electronic communication between people. Spam is a major problem for email users, with estimates of up to 56% of email falling into that category. Control of Spam is being attempted with technical and legislative methods. In this paper we look at email and spam from a supply-dema... | 2022-06-20T12:12:20.150Z | {
"ACL": null,
"DBLP": "journals/corr/cs-DC-0312022",
"ArXiv": "cs/0312022",
"MAG": "1524103283",
"CorpusId": "286",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/77690d8d433eb6387c24376f46b4824cd5a3d853 | GridEmail: A Case for Economically Regulated Internet-based Interpersonal Communications | [
{
"authorId": "3124792",
"name": "Manjuka Soysa"
},
{
"authorId": "1709598",
"name": "R. Buyya"
},
{
"authorId": "145114524",
"name": "B. Nath"
}
] | ArXiv | 2,003 | 67 | 2 | 0 | false | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle"
] | 2003-12-12T00:00:00 | {
"name": "ArXiv",
"volume": "cs.DC/0312022",
"pages": null
} | [
"communication",
"spam",
"email"
] | [
"internet",
"communication",
"email",
"email messages",
"spam"
] | [
"email messages",
"spam",
"email",
"communication",
"internet"
] | [
"electronic mail",
"computer science"
] |
289 | Two important metrics for measuring the quality of routing paths are the maximum edge congestion $C$ and maximum path length $D$. Here, we study bicriteria in routing games where each player $i$ selfishly selects a path that simultaneously minimizes its maximum edge congestion $C_i$ and path length $D_i$. We study the ... | 2022-06-30T08:34:58.196Z | {
"ACL": null,
"DBLP": "journals/corr/abs-0801-4851",
"ArXiv": "0801.4851",
"MAG": "1653306357",
"CorpusId": "289",
"PubMed": null,
"DOI": null,
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/a8fda2c1bdbe3580607f7373fff3e9874d3b0ce3 | Bicretieria Optimization in Routing Games | [
{
"authorId": "1932642",
"name": "C. Busch"
},
{
"authorId": "145297301",
"name": "R. Kannan"
}
] | ArXiv | 2,008 | 30 | 0 | 0 | false | [
{
"category": "Economics",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Mathematics",
"source": "external"
}
] | [
"JournalArticle"
] | 2008-01-31T00:00:00 | {
"name": "ArXiv",
"volume": "abs/0801.4851",
"pages": null
} | [
"social cost",
"optimization",
"routing scheme",
"routing algorithms",
"congestion"
] | [
"optimization",
"routing algorithms",
"routing scheme",
"congestion",
"social cost",
"best response",
"nash equilibrium",
"packet drops",
"computer games",
"gameplay",
"price of anarchy"
] | [
"social cost",
"best response",
"packet drops",
"price of anarchy",
"gameplay",
"optimization",
"routing scheme",
"computer games",
"routing algorithms",
"nash equilibrium",
"congestion"
] | [
"ad hoc networks",
"packet loss",
"telecommunication networks",
"game design",
"mathematics",
"routing protocols",
"game theory",
"interactive computer graphics",
"computer networks",
"telecommunication traffic",
"congestion control (communication)",
"routers",
"mobile telecommunication syst... |
294 | In this paper we present a new approach for marker less human motion capture from conventional camera feeds. The aim of our study is to recover 3D positions of key points of the body that can serve for gait analysis. Our approach is based on foreground segmentation, an articulated body model and particle filters. In or... | 2022-09-04T11:47:36.228Z | {
"ACL": null,
"DBLP": "journals/corr/abs-cs-0510062",
"ArXiv": "cs/0510062",
"MAG": "2951327123",
"CorpusId": "294",
"PubMed": null,
"DOI": "10.1109/ICTAI.2005.127",
"PubMedCentral": null
} | https://www.semanticscholar.org/paper/ee1ca264bacefc1a47177ac1b08977b1753561d3 | Using interval particle filtering for marker less 3D human motion capture | [
{
"authorId": "1716686",
"name": "J. Saboune"
},
{
"authorId": "1731714",
"name": "F. Charpillet"
}
] | 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05) | 2,005 | 11 | 29 | 2 | true | [
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Computer Science",
"source": "external"
}
] | [
"JournalArticle",
"Conference"
] | 2005-10-21T00:00:00 | {
"name": "17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05)",
"volume": null,
"pages": "7 pp.-627"
} | [
"human motion capture",
"particle filtering",
"foreground segmentation",
"configuration space",
"deterministic",
"particle filtering algorithms",
"partial occlusions"
] | [
"particle filtering",
"human motions",
"human emotion",
"human motion capture",
"foreground segmentation",
"configuration space",
"deterministic",
"partial occlusions",
"human motion analysis",
"motion capture data",
"motion analysis",
"probability hypothesis density",
"human walking"
] | [
"human motion capture",
"human motions",
"particle filtering",
"foreground segmentation",
"probability hypothesis density",
"human motion analysis",
"configuration space",
"deterministic",
"human walking",
"particle filtering algorithms",
"human emotion",
"partial occlusions",
"motion analys... | [
"robotics",
"motion estimation",
"target tracking",
"background subtraction",
"multi-target tracking",
"data fusion",
"probability",
"gesture recognition",
"robot programming",
"stochastic",
"biped locomotion",
"intelligent robots",
"man machine systems",
"affective computing",
"emotion ... |
Dataset Card for DBLP Discovery Dataset (D3)
Dataset Summary
DBLP is the largest open-access repository of scientific articles on computer science and provides metadata associated with publications, authors, and venues. We retrieved more than 6 million publications from DBLP and extracted pertinent metadata (e.g., abstracts, author affiliations, citations) from the publication texts to create the DBLP Discovery Dataset (D3). D3 can be used to identify trends in research activity, productivity, focus, bias, accessibility, and impact of computer science research. We present an initial analysis focused on the volume of computer science research (e.g., number of papers, authors, research activity), trends in topics of interest, and citation patterns. Our findings show that computer science is a growing research field (15% annually), with an active and collaborative researcher community. While papers in recent years present more bibliographical entries in comparison to previous decades, the average number of citations has been declining. Investigating papers’ abstracts reveals that recent topic trends are clearly reflected in D3. Finally, we list further applications of D3 and pose supplemental research questions. The D3 dataset, our findings, and source code are publicly available for research purposes.
Languages
English
Dataset Structure
Data Instances
Total size: 8.71 GB Papers size: 8.13 GB Authors size: 0.58 GB
Data Fields
Papers
| Feature | Description |
|---|---|
corpusid |
The unique identifier of the paper. |
externalids |
The same paper in other repositories (e.g., DOI, ACL). |
title |
The title of the paper. |
authors |
The authors of the paper with their authorid and name. |
venue |
The venue of the paper. |
year |
The year of the paper publication. |
publicationdate |
A more precise publication date of the paper. |
abstract |
The abstract of the paper. |
outgoingcitations |
The number of references of the paper. |
ingoingcitations |
The number of citations of the paper. |
isopenaccess |
Whether the paper is open access. |
influentialcitationcount |
The number of influential citations of the paper according to SemanticScholar. |
s2fieldsofstudy |
The fields of study of the paper according to SemanticScholar. |
publicationtypes |
The publication types of the paper. |
journal |
The journal of the paper. |
updated |
The last time the paper was updated. |
url |
A url to the paper in SemanticScholar. |
Authors
| Feature | Description |
|---|---|
authorid |
The unique identifier of the author. |
externalids |
The same author in other repositories (e.g., ACL, PubMed). This can include ORCID |
name |
The name of the author. |
affiliations |
The affiliations of the author. |
homepage |
The homepage of the author. |
papercount |
The number of papers the author has written. |
citationcount |
The number of citations the author has received. |
hindex |
The h-index of the author. |
updated |
The last time the author was updated. |
email |
The email of the author. |
s2url |
A url to the author in SemanticScholar. |
Data Splits
papersauthors
Dataset Creation
Curation Rationale
Providing a resource to analyze the state of computer science research statistically and semantically.
Source Data
Initial Data Collection and Normalization
DBLP and from v2.0 SemanticScholar
Additional Information
Dataset Curators
Licensing Information
The DBLP Discovery Dataset is released under the CC BY-NC 4.0. By using this corpus, you are agreeing to its usage terms.
Citation Information
If you use the dataset in any way, please cite the following paper. Preprint: https://arxiv.org/abs/2204.13384
@inproceedings{Wahle2022c,
title = {D3: A Massive Dataset of Scholarly Metadata for Analyzing the State of Computer Science Research},
author = {Wahle, Jan Philip and Ruas, Terry and Mohammad, Saif M. and Gipp, Bela},
year = {2022},
month = {July},
booktitle = {Proceedings of The 13th Language Resources and Evaluation Conference},
publisher = {European Language Resources Association},
address = {Marseille, France},
doi = {},
}
Also make sure to cite the following papers if you use SemanticScholar data:
@inproceedings{ammar-etal-2018-construction,
title = "Construction of the Literature Graph in Semantic Scholar",
author = "Ammar, Waleed and
Groeneveld, Dirk and
Bhagavatula, Chandra and
Beltagy, Iz",
booktitle = "Proceedings of the 2018 Conference of the North {A}merican Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 3 (Industry Papers)",
month = jun,
year = "2018",
address = "New Orleans - Louisiana",
publisher = "Association for Computational Linguistics",
url = "https://aclanthology.org/N18-3011",
doi = "10.18653/v1/N18-3011",
pages = "84--91",
}
@inproceedings{lo-wang-2020-s2orc,
title = "{S}2{ORC}: The Semantic Scholar Open Research Corpus",
author = "Lo, Kyle and Wang, Lucy Lu and Neumann, Mark and Kinney, Rodney and Weld, Daniel",
booktitle = "Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics",
month = jul,
year = "2020",
address = "Online",
publisher = "Association for Computational Linguistics",
url = "https://www.aclweb.org/anthology/2020.acl-main.447",
doi = "10.18653/v1/2020.acl-main.447",
pages = "4969--4983"
}
```### Contributions
Thanks to [@jpwahle](https://github.com/jpwahle) for adding this dataset.
- Downloads last month
- 124