sentence1
stringlengths 16
446
| sentence2
stringlengths 14
436
|
---|---|
the existing algorithms for solving the minimum sum-rate problem in for the finite linear source model start with an estimation of the minimum sum-rate . | the existing algorithms for solving the minimum sum-rate problem all start with an estimation of the minimum sumrate , eg , the ones in for non-asymptotic model . |
motivated by this challenge , we designed an ec security architecture , the trust zone , in order to enhance and extend the 5g aaa approach to a cognitive solution . | motivated by this challenge , we designed an edge cloud security architecture , the trust zone , in order to enhance and extend the 5g aaa approach to a cognitive solution . |
adjoint based error estimation is widely used for a host of numerical methods including finite elements , time integration , multi-scale simulations and inverse problems . | goal-oriented error estimation in general is based on duality techniques and has already been used for a variety of applications such as mesh refinement in finite element methods . |
over the past few years , convolutional neural networks have become the leading approach in many vision-related tasks . | in recent years , deep neural networks have achieved great success in a variety of machine learning tasks . |
for galaxies , the tpcf is a simple , fundamental statistic of the galaxy distribution . | for three of the four galaxies , a10 is a better match to the published bar lengths than either amax or amin . |
moreover , their methods use an edgecentric program model , so it is difficult to implement them on current graph computing systems such as pregel . | however their methods are edge centric methods , which can not be easily applied to current vertex centric graph computing systems such as graphlab . |
for exchange and correlation we applied the gradient corrected approach using the generalized gradient approximation functional following the approach suggested by perdew-burke-ernzerhof . | in these studies we applied the perdew-burke-ernzerhof generalized gradient approximation with tkatchenko-scheffler van der waals interactions as the exchange-correlation functional . |
it would be interesting to explore this further . | clearly , it would be interesting to understand this phenomenon better . |
as a classifier , we use an svm , implemented in sklearn under the name svc toolkit . | as classifier we use a traditional model , a support vector machine with linear kernel implemented in scikit-learn . |
our value is consistent with the previous determinations by interferometry . | our mean ud diameter value is consistent with these two recent measurements . |
we used the scikit-learn implementation , in with 1000 estimators . | we used the scikit-learn implementation with lof , osvm , if , knn , svm , rf and nn . |
deep convolutional neural networks have achieved great success in various computer vision tasks such as image classification . | one of the commonly used architectures , namely convolutional neural network , has presented record breaking results in computer vision tasks such as object recognition and classification . |
cosmic strings are topological defects which may have formed during a phase transition in the early universe . | cosmic strings are line-like topological defects that are likely to emerge through phase transitions with spontaneous symmetry breaking . |
the exchange correlation between electrons was treated with generalized gradient approximation in the perdewburke-ernzerhof form . | the electron exchangecorrelation functional was treated using the generalized gradient approximation in the form proposed by perdew , burke , and ernzerhof . |
a single defect in pbg environments can possess localized modes for frequencies inside the gap . | as it was stated earlier single defects in pbg environments can possess localized modes for frequencies inside the gap . |
in this case , sequence detection can be performed using recurrent neural networks . | sequence detection can be performed using recurrent neural networks . |
the attractors of iterated function systems , a basic tool is the box-covering method . | the attractors of iterated function systems , a basic tool is the box covering method , that can be applied to networks . |
note that here the trispectrum terms may contribute an even larger correction on small scales . | note that on very small scales , the non-gaussian contribution from the trispectrum might be significant . |
lattice-boltzmann simulations of liquid-gas and binary fluid mixtures . | lattice boltzmann simulation of nonideal fluids . |
it is based on the bsp model and adopts the vertex-centric paradigm with explicit messages to support scalable big graph processing . | it adopts the bulksynchronous parallel model with explicit messages to let users implement graph algorithms in a vertex-centric way . |
for our cnn , we use 300-dimensional word2vec word embeddings trained on googlenews dataset 3 , and 128 feature maps with filter width . | we use the 300-dimension word2vec embeddings pretrained on google news dataset with about 100 billion words . |
deep convolutional neural networks have achieved great success in computer vision related tasks such as image classification , and so on . | in particular , convolutional neural networks have been very successful for image classification . |
gauge theories on non-commutative spaces can arise in certain limits of string theory . | indeed , noncommutative field theories can be derived from string theory by the seiberg-witten limit . |
deep convolutional neural networks have achieved great success in various computer vision tasks such as image classification . | convolutional neural networks provide state-of-the-art results for many machine learning challenges , such as image classification . |
a classic algorithm called the probabilistic classifier chain is a state-of-the-art csmlc algorithm . | a classic algorithm called probabilistic classifier chain , an algorithm that extends from cc , is a state-of-the-art csmlc algorithm . |
a method to prove that some families are fc , 2 . | a method to prove that some families are not fc , 3 . |
since the diffraction-limited region of an approximate bessel beam extends over large propagation distances , multiple trapping of particles with a single beam becomes possible . | for example , simultaneous trapping of several particles over large axial distances is possible by using just one single bessel beam . |
model-based test generation techniques can target specific scenarios or requirements more effectively . | model-based test generation techniques can target specific use cases or requirements far more efficiently and effectively . |
an isomorphism is a morphism with a continuous inverse . | which satisfies φ is called a sequential isomorphism . |
physical states also exist when solely scalar multiplets are concerned . | physical states also exit when solely scalar multiplets are concerned . |
the air-suspended nanotubes are synthesized by alcohol chemical vapor deposition . | the nanotubes are synthesized by alcohol chemical vapor deposition from catalyst particles placed near the trenches . |
we select the same set of 871 subjects used in , comprising 403 individuals with asd and 468 healthy controls acquired at 20 different sites . | we select the same set of 871 subjects used by abraham et al that met the imaging quality and phenotypic information criteria , comprising 403 individuals with asd and 468 healthy controls . |
it has indeed been shown in zou that the lasso estimator does not have the oracle property even in the finite parameter setting . | as a consequence , zou shows that the adaptive lasso has the oracle property under some regularity conditions . |
a possible solution to this sensitivity problem is the design of a special sensing chamber that controls humidity and delivers the gas to the sensors under predefined conditions . | a possible solution to this sensitivity problem is a design of a special sensing chamber that controls humidity and delivers the gas to the sensors under predefined conditions . |
the flow-motion network was trained for 750k steps with the adam optimizer . | the network was trained using an adam optimizer for gradient descent . |
in fact , the direct implementation is known to be slow for practical settings of σs . | in general , the direct implementation is slow for practical settings of σ s . |
deep convolutional neural networks have made significant progress in classification problems , which have shown to generate good results when provided sufficient data . | convolutional neural networks , alexnet being some famous examples , have demonstrated impressive performance on object detection tasks and are considered particularly well suited for feature extraction and classification . |
we use the metropolis algorithm to simulate two-dimensional ising system . | the monte carlo simulation that we perform employs the standard metropolis algorithm . |
the conditions have recently proved important in constructing electromagnetic cloaking structures . | the db conditions have been shown to play a central role in electromagnetic cloaking problems . |
in quantum mechanics h is the planck constant . | the firmest thing of all in quantum mechanics is the formalism itself . |
the benefits of network coding for distributed storage were first formalized by the work of dimakis et al . | the benefits of network coding for distributed storage has been first formalized by the work of dimakis et al . |
from the arguments given in this paper , one can also see that the pauli-villars regularization and dimensional regularization gives the same result on the transverse anomaly of the axial vector and vector current . | at this point we remark that instead of pauli-villars regularization , one can also employ other regularization schemes such as dimensional regularization to calculate the transverse anomalies . |
in , izumi studied certain explicit examples of endomorphisms of cuntz algebras motivated by subfactor theory . | in particular , localized endomorphisms of the cuntz algebras were investigated in the framework of the jones index theory in . |
the thick lines represent the phase boundaries . | the thick lines show the phase boundaries . |
asymptotic distribution and variance calculations were recently developed for m-estimators in this regime , el karoui , 2013 , donoho and montanari , 2013 . | it was previously shown that the asymptotic distribution of m-estimators in this design is nontrivial , donoho and montanari , 2013 , el karoui , 2013 . |
multi-task learning for neural networks in general and within nlp specifically has been widely studied . | multi-task learning has been extensively studied in the literature , with applications to a wide set of problems ranging from natural language processing . |
this is because each nucleon in the projectile does not excite pion production independently . | this indicates each nucleon in the projectile excites pion production almost dependently . |
generative adversarial network is a class of deep learning algorithms that is used for generative modeling . | generative adversarial networks are a class of artificial intelligence algorithms used in unsupervised machine learning , which are introduced by . |
the asterisk denotes additional information in the text . | the asterisk denotes that this result is strictly valid only when also a time average is considered . |
the lower plot indicates the tail of the distribution . | the high-k tail of the distribution is shown in the lower plot . |
note that if an energy estimate with bounding properties is used , then a similar bounding of the error in the quantity of interest can be obtained . | note that if we use an energy estimate with bounding properties , then the error estimate for the quantity of interest is bounded . |
the belle detector is a large-solid-angle spectrometer based on a 1 5 t superconducting solenoid magnet . | the belle detector is a large-solid-angle magnetic spectrometer that consists of a three-layer silicon vertex detector . |
the ultracold bose gas in optical lattices is well described by the bose-hubbard model . | in particular , bosons in optical lattices are near ideal realizations of the bose-hubbard model . |
the generic architectures of the homogeneously encoded and heterogeneously encoded asynchronous rcas are given in and the reader is referred to the same for details . | the circuit architectures of the homogeneously and heterogeneously encoded asynchronous adders are given in , and the interested reader is referred to the same for details . |
deep neural networks have shown improvement in state-of-the-art in different tasks , such as image classification . | deep neural networks have been adopted to improve the performance of state-of-the-arts on a wide variety of tasks in computer vision , including image classification . |
specifically , convolutional neural networks have proved its effectiveness in a wide range of applications such as object recognition . | deep neural networks have significantly improved the state of the art on many supervised tasks . |
summation formulas for the penalization terms . | discrete duality formulas for the convection terms . |
cluster algebras form a large , axiomatically defined class of algebras , introduced by fomin and zelevinsky . | cluster algebras were introduced by fomin and zelevinsky in the series of papers . |
our approach relies on the theory of graph signal processing . | we do so by building on the theory of graph signal processing . |
more recently , graph attention networks have been introduced as an effective alternative for graph data modeling . | recently , graph convolutional networks have been widely studied for graph representation and learning . |
although string theory is a strong candidate of it , the dynamics of the fermion states in string theories has not yet been extensively studied . | more importantly , string theory is a perfectly quantum mechanical theory which does include gravity . |
such an asymmetry is the remnant of the partonic asymmetry . | this asymmetry is the origin of the finite real part of the soft mode . |
the generalized gradient approximation according to perdewburke-ernzerhof was employed for both the generation of the pseudopotentials and the exchange-correlation functional . | the generalized gradient approximation of perdew-burkeernzerhof 30 type was employed for the exchange-correlation energy . |
convolutional neural networks have achieved remarkable successes for various tasks , such as object recognition and so on . | convolutional neural networks have recently provided state of the art results for several recognition tasks including object recognition . |
the encoder in the epva method is initialized with the vgg network pretrained on imagenet . | the network is initialized with the weights from the pretrained resnet-101 model on imagenet . |
these networks have shown impressive results on computer vision tasks such as image labeling and object detection . | these visual representations have been shown to be effective on a wide range of computer vision tasks . |
deep neural networks have achieved state-of-the-art performance on tasks such as image recognition in the last few years . | with the recent advances in deep convolutional neural networks , numerous image generation methods have achieved the state-of-the-art results . |
the result of the ks-test is the probability of null-hypothesis that two distributions of the indicator are generated from the same population . | the result of the ks-test is the probability of the null-hypothesis that two distributions of the indicator are generated from the same population . |
convolutional neural networks have improved the performance of image classification significantly . | object recognition has made significant progress with convolutional neural networks . |
it is natural to conjecture that this is the unique non-zero irreducible object of this category . | a natural conjecture to make is the following . |
hu et al propose the squeezeand-excitation block that adaptively recalibrates channelwise feature responses by explicitly modelling interdependencies between channels . | recently , hu et al proposes the squeeze-andexcitation block , which adaptively recalibrates channelwise feature responses by explicitly modelling interdependencies between channels . |
the saturation below 1gev is the result of the fixed age of the cr particles , which is caused by the dynamical arms . | this contribution is negative , and is called normal saturation . |
for c sb , we can use the floyd-warshall algorithm to compute all-pairs shortest paths in a graph . | the floyd-warshall algorithm is usually used to calculate all the pairs-shortest-paths in 1 g and 2 g . |
set a contact lie group is a dimension n is called a legendrian submanifold of g . | this submanifold is the only tangentially degenerate submanifold without singularities in p n . |
a different proof , based on the jones polynomial , follows from . | one proof which uses directly this relation to the jones polynomial is given in . |
see labourie for definitions and more detailed discussions of anosov representations . | in this section , we recall the definition and basic properties of anosov representations , see labourie for further details . |
phillips , university of arizona press , tuscon , pp . | gehrels , university of arizona press , tucson , pp . |
there is growing evidence that all the known perturbative ten dimensional superstring theories are limits of an eleven dimensional theory called m theory . | the dualities between various superstring theories and m theory provide strong constraints on their effective actions . |
since the higgs field is a component of the four-dimensional gluon field , no linear divergence of the higgs self-energy can occur due to the slavnov-taylor identities of the four-dimensional theory . | the higgs field is the responsible for triggering this ewsb mechanism . |
we show that taking into account adiabatic expansion losses it is possible to describe the spectral evolution during the decay phase of individual pulses in long grbs . | finally , we argue that the observed spectral behavior of long pulses , during the grb decay phase of the light curve , can be described taking into account the energy loss for adiabatic expansion . |
if there is no overshoot , which happens in particular in models with continuous asset prices , then the growth-optimal portfolio is indeed optimal . | if the objective is somewhat altered into minimizing expected market time , as we shall define below , then the growth-optimal portfolio is indeed optimal . |
the ellipses denote the terms that are suppressed by positive powers of b . | where ellipses denote higher-twist contributions , ψ is a quark field and m is the nucleon mass . |
various combinations of optical oscillations and tunneling ( bo , do and zt ) are formed as demonstrated on the phase diagram . | various superpositions of optical oscillations and zt are shown on the phase diagram . |
kirkpatrick et al proposes elastic weight consolidation whose objective is to minimize the change of weights that are important to previous tasks through the use of a quadratic constraint . | recently , kirkpatrick et al proposed elastic weight consolidation , a quadratic penalty on the difference between the parameters for the new and the old task . |
goodfellow et al claim that , in the case of neural networks , there is an excess of linearity in the behaviour of the networks . | goodfellow et al validate that practical attack in deep neural networks is possible because these models are locally linear . |
we simulate the performance of our diva profiling mechanism using a modified version of ramulator . | we evaluate voltron using ramulator , integrated with a multicore performance simulator . |
the aforementioned narrowband systems use measurements of the radio to extract information about people in the surrounding environment and therefore , such networks are referred to as rf sensor networks . | in general , these systems utilize received signal strength measurements of the radio for gaining situational awareness of the surrounding environment and therefore , they are commonly referred to as rf sensor networks . |
ei buchbinder , il buchbinder , sm kuzenko , phys . | il buchbinder , ei buchbinder , sm kuzenko , ba ovrut , phys . |
cluster algebras have been introduced by fomin and zelevinsky in in the context of total positivity and canonical bases in lie theory . | cluster algebras were introduced by fomin and zelevinsky in in order to study total positivity and canonical bases in semisimple groups . |
our proposed method is implemented based on the deep learning library pytorch . | we have implemented our method by using pytorch , which is one of the most famous machine learning library . |
since only the weak convergence was obtained in , no convergence rate was provided . | however , since only the weak convergence was obtained in , no convergence rate was provided there . |
recently , deep convolutional neural networks have attracted much research attention in visual recognition , largely due to their excellent performance . | deep convolutional neural networks have been successful in many computer vision tasks including image classification . |
wang et al propose a recurrent fully convolutional network for saliency detection that includes priors to correct initial saliency detection errors . | wang et al generated saliency prior maps using low-level cues and further exploited it to guide the prediction of saliency recurrently . |
we implement the proposed model using pytorch on a single nvidia p40 gpu . | we implement the deep affinity network using the pytorch framework . |
like many previous researches , this paper compares the performance of its proposed method with other individual clustering methods and cluster ensemble methods by using standard data sets and their real classes . | like many pervious researches , this paper compares the performance of its proposed method with other individual clustering methods and cluster ensemble methods by using standard datasets and their real classes . |
to minimize the error of linear queries under differential privacy requirements , several methods try to build a synopsis of the original database , such as fourier transformations . | to minimize the error of linear queries under differential privacy requirements , several methods try to build a synopsis of the original database , such as fourier transformations and hierarchical trees . |
starting with the work of li and haldane , the behavior of entanglement spectrum of two-dimensional systems has been extensively studied . | starting with the work of li and haldane , the behavior of the entanglement spectrum of twodimensional systems has been extensively studied . |
silicon is the most widely used semiconductor in microelectronics . | silicon is a promising candidate for constructing a cavity-phoniton system . |
recurrent neural networks have been gaining popularity in the machine learning community due to their impressive performance on tasks such as machine translation . | deep neural networks have become an extremely popular learning technique , with significant deployment in a wide variety of practical domains such as image classification . |
socher et al , 2012 , uses a recursive neural network in relation extraction , and further use lstm . | miwa et al , used long short term memory based rnns for relation classification . |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.