Dataset Preview
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 7 new columns ({'similar_books', 'authors', 'publisher', 'publication_year', 'genres', 'book_id', 'description'}) and 4 missing columns ({'mag_id', 'abstract', 'category', 'label_id'}).
This happened while the csv dataset builder was generating data using
zip://Book.csv::hf://datasets/Cloudy1225/HTAG@16e6e1d0e89012dbda758ed4f88c74e470446a07/book/Book.csv.zip
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1870, in _prepare_split_single
writer.write_table(table)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 622, in write_table
pa_table = table_cast(pa_table, self._schema)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2292, in table_cast
return cast_table_to_schema(table, schema)
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2240, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
book_id: int64
title: string
description: string
publication_year: int64
publisher: string
authors: string
similar_books: string
genres: string
-- schema metadata --
pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 1205
to
{'mag_id': Value(dtype='int64', id=None), 'title': Value(dtype='string', id=None), 'abstract': Value(dtype='string', id=None), 'label_id': Value(dtype='int64', id=None), 'category': Value(dtype='string', id=None)}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1412, in compute_config_parquet_and_info_response
parquet_operations, partial, estimated_dataset_info = stream_convert_to_parquet(
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 988, in stream_convert_to_parquet
builder._prepare_split(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1741, in _prepare_split
for job_id, done, content in self._prepare_split_single(
File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1872, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 7 new columns ({'similar_books', 'authors', 'publisher', 'publication_year', 'genres', 'book_id', 'description'}) and 4 missing columns ({'mag_id', 'abstract', 'category', 'label_id'}).
This happened while the csv dataset builder was generating data using
zip://Book.csv::hf://datasets/Cloudy1225/HTAG@16e6e1d0e89012dbda758ed4f88c74e470446a07/book/Book.csv.zip
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
mag_id int64 | title string | abstract string | label_id int64 | category string |
|---|---|---|---|---|
9,657,784 | Evasion Attacks against Machine Learning at Test Time | In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data. In one pertinent, well-motivated attack scenario, an adversary may attempt to evade a deployed system at test time by carefully manipulating attack samples. In this work, we present... | 4 | cs.CR |
39,886,162 | How Hard is Computing Parity with Noisy Communications | We show a tight lower bound of $\Omega(N \log\log N)$ on the number of transmissions required to compute the parity of $N$ input bits with constant error in a noisy communication network of $N$ randomly placed sensors, each having one input bit and communicating with others using local transmissions with power near the... | 5 | cs.DC |
121,432,379 | A Promise Theory Perspective on Data Networks | Networking is undergoing a transformation throughout our industry. The shift from hardware driven products with ad hoc control to Software Defined Networks is now well underway. In this paper, we adopt the perspective of the Promise Theory to examine the current state of networking technologies so that we might see bey... | 8 | cs.NI |
1,444,859,417 | Webvrgis Based City Bigdata 3d Visualization and Analysis | This paper shows the WEBVRGIS platform overlying multiple types of data about Shenzhen over a 3d globe. The amount of information that can be visualized with this platform is overwhelming, and the GIS-based navigational scheme allows to have great flexibility to access the different available data sources. For example,... | 6 | cs.HC |
1,483,430,697 | Information Theoretic Authentication and Secrecy Codes in the Splitting Model | In the splitting model, information theoretic authentication codes allow non-deterministic encoding, that is, several messages can be used to communicate a particular plaintext. Certain applications require that the aspect of secrecy should hold simultaneously. Ogata-Kurosawa-Stinson-Saido (2004) have constructed optim... | 4 | cs.CR |
1,486,601,621 | Whealth Transforming Telehealth Services | A worldwide increase in proportions of older people in the population poses the challenge of managing their increasing healthcare needs within limited resources. To achieve this many countries are interested in adopting telehealth technology. Several shortcomings of state-of-the-art telehealth technology constrain wide... | 3 | cs.CY |
1,528,301,850 | A Bi Level View of Inpainting Based Image Compression | Inpainting based image compression approaches, especially linear and non-linear diffusion models, are an active research topic for lossy image compression. The major challenge in these compression models is to find a small set of descriptive supporting points, which allow for an accurate reconstruction of the original ... | 16 | cs.CV |
1,542,788,159 | Back to the Past Source Identification in Diffusion Networks From Partially Observed Cascades | When a piece of malicious information becomes rampant in an information diffusion network, can we identify the source node that originally introduced the piece into the network and infer the time when it initiated this? Being able to do so is critical for curtailing the spread of malicious information, and reducing the... | 26 | cs.SI |
1,581,827,225 | Homomorphic Encryption Theory and Application | The goal of this chapter is to present a survey of homomorphic encryption techniques and their applications. After a detailed discussion on the introduction and motivation of the chapter, we present some basic concepts of cryptography. The fundamental theories of homomorphic encryption are then discussed with suitable ... | 4 | cs.CR |
1,585,744,708 | Learning Transformations for Clustering and Classification | A low-rank transformation learning framework for subspace clustering and classification is here proposed. Many high-dimensional data, such as face images and motion sequences, approximately lie in a union of low-dimensional subspaces. The corresponding subspace clustering problem has been extensively studied in the lit... | 16 | cs.CV |
1,586,330,215 | Methods for Integrating Knowledge with the Three Weight Optimization Algorithm for Hybrid Cognitive Processing | In this paper we consider optimization as an approach for quickly and flexibly developing hybrid cognitive capabilities that are efficient, scalable, and can exploit knowledge to improve solution speed and quality. In this context, we focus on the Three-Weight Algorithm, which aims to solve general optimization problem... | 10 | cs.AI |
1,591,405,962 | Csma Local Area Networking Under Dynamic Altruism | In this paper, we consider medium access control of local area networks (LANs) under limitedinformation conditions as befits a distributed system. Rather than assuming “by rule” conformance to a protocol designed to regulate packet-flow rates (e.g., CSMA windowing), we begin with a noncooperative game framework and bui... | 8 | cs.NI |
1,595,098,738 | Face Frontalization for Alignment and Recognition | Recently, it was shown that excellent results can be achieved in both face landmark localization and pose-invariant face recognition. These breakthroughs are attributed to the efforts of the community to manually annotate facial images in many different poses and to collect 3D faces data. In this paper, we propose a no... | 16 | cs.CV |
1,596,723,206 | From Bounded Affine Types to Automatic Timing Analysis | Bounded linear types have proved to be useful for automated resource analysis and control in functional programming languages. In this paper we introduce an affine bounded linear typing discipline on a general notion of resource which can be modeled in a semiring. For this type system we provide both a general type-inf... | 22 | cs.PL |
1,601,434,380 | An Efficient Way to Perform the Assembly of Finite Element Matrices in Matlab and Octave | We describe different optimization techniques to perform the assembly of finite element matrices in Matlab and Octave, from the standard approach to recent vectorized ones, without any low level language used. We finally obtain a simple and efficient vectorized algorithm able to compete in performance with dedicated so... | 0 | cs.NA |
1,607,460,189 | Constrained Parametric Proposals and Pooling Methods for Semantic Segmentation in Rgb D Images | We focus on the problem of semantic segmentation based on RGB-D data, with emphasis on analyzing cluttered indoor scenes containing many instances from many visual categories. Our approach is based on a parametric figure-ground intensity and depth-constrained proposal process that generates spatial layout hypotheses at... | 16 | cs.CV |
1,618,900,328 | Regulation and the Integrity of Spreadsheets in the Information Supply Chain | Spreadsheets provide many of the key links between information systems, closing the gap between business needs and the capability of central systems. Recent regulations have brought these vulnerable parts of information supply chains into focus. The risk they present to the organisation depends on the role that they fu... | 3 | cs.CY |
1,623,729,836 | Reconfigurable Wireless Networks | Driven by the advent of sophisticated and ubiquitous applications, and the ever-growing need for information, wireless networks are without a doubt steadily evolving into profoundly more complex and dynamic systems. The user demands are progressively rampant, while application requirements continue to expand in both ra... | 8 | cs.NI |
1,657,294,604 | Pushdown Abstractions of Javascript | We design a family of program analyses for JavaScript that make no approximation in matching calls with returns, exceptions with handlers, and breaks with labels. We do so by starting from an established reduction semantics for JavaScript and systematically deriving its intensional abstract interpretation. Our first st... | 22 | cs.PL |
1,661,863,441 | A Notion of Robustness for Cyber Physical Systems | Robustness as a system property describes the degree to which a system is able to function correctly in the presence of disturbances, i.e., unforeseen or erroneous inputs. In this paper, we introduce a notion of robustness termed input-output dynamical stability for cyber-physical systems (CPS) which merges existing ... | 19 | cs.SY |
1,665,669,548 | Memristors Can Implement Fuzzy Logic | In our work we propose implementing fuzzy logic using memristors. Min and max operations are done by antipodally configured memristor circuits that may be assembled into computational circuits. We discuss computational power of such circuits with respect to m-efficiency and experimentally observed behavior of memristiv... | 18 | cs.ET |
1,681,484,497 | Informetric Analyses of Knowledge Organization Systems Koss | A knowledge organization system (KOS) is made up of concepts and semantic relations between the concepts which represent a knowledge domain terminologically. We distinguish between five approaches to KOSs: nomenclatures, classification systems, thesauri, ontologies and, as a borderline case of KOSs, folksonomies. The r... | 38 | cs.DL |
1,682,705,844 | Latent Topic Models for Hypertext | Latent topic models have been successfully applied as an unsupervised topic discovery technique in large document collections. With the proliferation of hypertext document collection such as the Internet, there has also been great interest in extending these approaches to hypertext [6, 9]. These approaches typically mo... | 31 | cs.IR |
1,698,782,162 | Complete Security Framework for Wireless Sensor Networks | Security concern for a Sensor Networks and level of security desired may differ according to application specific needs where the sensor networks are deployed. Till now, most of the security solutions proposed for sensor networks are layer wise i.e a particular solution is applicable to single layer itself. So, to inte... | 4 | cs.CR |
1,720,451,657 | Network Maps of Technology Fields a Comparative Analysis of Relatedness Measures | Network maps of technology fields extracted from patent databases are useful to aid in technology forecasting and road mapping. Constructing such a network requires a measure of the relatedness between pairs of technology fields. Despite the existence of various relatedness measures in the literature, it is unclear how... | 26 | cs.SI |
1,738,519,518 | Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets | Cloud computing has been an emerging model which aims at allowing customers to utilize computing resources hosted by Cloud Service Providers (CSPs). More and more consumers rely on CSPs to supply computing and storage service on the one hand, and CSPs try to attract consumers on favorable terms on the other. In such co... | 5 | cs.DC |
1,754,384,483 | Inference Less Density Estimation Using Copula Bayesian Networks | We consider learning continuous probabilistic graphical models in the face of missing data. For non-Gaussian models, learning the parameters and structure of such models depends on our ability to perform efficient inference, and can be prohibitive even for relatively modest domains. Recently, we introduced the Copula B... | 24 | cs.LG |
1,791,983,455 | A Survey on Handover Management in Mobility Architectures | This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on their ability to support horizontal handovers, vertical handovers and ... | 8 | cs.NI |
1,798,241,237 | Many Task Computing and Blue Waters | This report discusses many-task computing (MTC) generically and in the context of the proposed Blue Waters systems, which is planned to be the largest NSF-funded supercomputer when it begins production use in 2012. The aim of this report is to inform the BW project about MTC, including understanding aspects of MTC appl... | 5 | cs.DC |
1,812,070,052 | Identifying Reliable Annotations for Large Scale Image Segmentation | Challenging computer vision tasks, in particular semantic image segmentation, require large training sets of annotated images. While obtaining the actual images is often unproblematic, creating the necessary annotation is a tedious and costly process. Therefore, one often has to work with unreliable annotation sources,... | 16 | cs.CV |
1,818,296,812 | Earthquake Disaster Based Efficient Resource Utilization Technique in Iaas Cloud | Cloud Computing is an emerging area. The main aim of the initial search-and-rescue period after strong earthquakes is to reduce the whole number of mortalities. One main trouble rising in this period is to and the greatest assignment of available resources to functioning zones. For this issue a dynamic optimization mod... | 5 | cs.DC |
1,839,164,722 | Learning Economic Parameters From Revealed Preferences | A recent line of work, starting with Beigman and Vohra (2006) and Zadimoghaddam and Roth (2012), has addressed the problem of {\em learning} a utility function from revealed preference data. The goal here is to make use of past data describing the purchases of a utility maximizing agent when faced with certain prices a... | 36 | cs.GT |
1,844,261,290 | Towards Adapting Imagenet to Reality Scalable Domain Adaptation with Implicit Low Rank Transformations | Images seen during test time are often not from the same distribution as images used for learning. This problem, known as domain shift, occurs when training classifiers from object-centric internet image databases and trying to apply them directly to scene understanding tasks. The consequence is often severe performanc... | 16 | cs.CV |
1,849,650,586 | Using Multiple Criteria Methods to Evaluate Community Partitions | Community detection is one of the most studied problems on complex networks. Although hundreds of methods have been proposed so far, there is still no universally accepted formal definition of what is a good community. As a consequence, the problem of the evaluation and the comparison of the quality of the solutions pr... | 26 | cs.SI |
1,852,713,323 | Incremental Adaptation Strategies for Neural Network Language Models | It is today acknowledged that neural network language models outperform backoff language models in applications like speech recognition or statistical machine translation. However, training these models on large amounts of data can take several days. We present efficient techniques to adapt a neural network language mo... | 13 | cs.NE |
1,899,741,157 | Towards Ontological Support for Principle Solutions in Mechanical Engineering | The engineering design process follows a series of standardized stages of development, which have many aspects in common with software engineering. Among these stages, the principle solution can be regarded as an analogue of the design specification, fixing as it does the way the final product works. It is usually cons... | 23 | cs.SE |
1,912,377,242 | Throughput Capacity of Two Hop Relay Manets Under Finite Buffers | Since the seminal work of Grossglauser and Tse [1], the two-hop relay algorithm and its variants have been attractive for mobile ad hoc networks (MANETs) due to their simplicity and efficiency. However, most literature assumed an infinite buffer size for each node, which is obviously not applicable to a realistic MANET... | 29 | cs.PF |
1,913,435,380 | Ranking the Importance Level of Intermediaries to a Criminal Using a Reliance Measure | Recent research on finding important intermediate nodes in a network suspected to contain criminal activity is highly dependent on network centrality values. Betweenness centrality, for example, is widely used to rank the nodes that act as brokers in the shortest paths connecting all source and all the end nodes in a n... | 26 | cs.SI |
1,952,469,305 | Paxoslease Diskless Paxos for Leases | This paper describes PaxosLease, a distributed algorithm for lease negotiation. PaxosLease is based on Paxos, but does not require disk writes or clock synchrony. PaxosLease is used for master lease negotation in the open-source Keyspace and ScalienDB replicated key-value stores. | 5 | cs.DC |
1,955,776,637 | On the Optimality of Simple Schedules for Networks with Multiple Half Duplex Relays | This paper studies networks that consist of $N$ half-duplex relays assisting the communication between a source and a destination. In ISIT’12 Brahma et al. conjectured that in Gaussian half-duplex diamond networks (i.e., without a direct link between the source and the destination, and with $N$ non-interf... | 28 | cs.IT |
1,956,364,207 | Interaction and Resistance the Recognition of Intentions in New Human Computer Interaction | Just as AI has moved away from classical AI, human-computer interaction (HCI) must move away from what I call 'good old fashioned HCI' to 'new HCI' - it must become a part of cognitive systems research where HCI is one case of the interaction of intelligent agents (we now know that interaction is essential for intellig... | 6 | cs.HC |
1,962,645,729 | Optimizations for Decision Making and Planning in Description Logic Dynamic Knowledge Bases | Artifact-centric models for business processes recently raised a lot of attention, as they manage to combine structural (i.e. data related) with dynamical (i.e. process related) aspects in a seamless way. Many frameworks developed under this approach, although, are not built explicitly for planning, one of the most pro... | 10 | cs.AI |
1,965,341,892 | Inference and Evaluation of the Multinomial Mixture Model for Text Clustering | In this article, we investigate the use of a probabilistic model for unsupervised clustering in text collections. Unsupervised clustering has become a basic module for many intelligent text processing applications, such as information retrieval, text classification or information extraction. Recent proposals have been ... | 31 | cs.IR |
1,972,197,965 | The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel | We consider oblivious transfer between Alice and Bob in the presence of an eavesdropper Eve when there is a broadcast channel from Alice to Bob and Eve. In addition to the secrecy constraints of Alice and Bob, Eve should not learn the private data of Alice and Bob. When the broadcast channel consists of two independent... | 28 | cs.IT |
1,974,370,252 | The Ergodic Capacity of Phase Fading Interference Networks | We identify the role of equal strength interference links as bottlenecks on the ergodic sum capacity of a K user phase-fading interference network, i.e., an interference network where the fading process is restricted primarily to independent and uniform phase variations while the channel magnitudes are held fixed acros... | 28 | cs.IT |
1,977,183,758 | Greendcn a General Framework for Achieving Energy Efficiency in Data Center Networks | The popularization of cloud computing has raised concerns over the energy consumption that takes place in data centers. In addition to the energy consumed by servers, the energy consumed by large numbers of network devices emerges as a significant problem. Existing work on energy-efficient data center networking primar... | 8 | cs.NI |
1,981,029,888 | Rappor Randomized Aggregatable Privacy Preserving Ordinal Response | Randomized Aggregatable Privacy-Preserving Ordinal Response, or RAPPOR, is a technology for crowdsourcing statistics from end-user client software, anonymously, with strong privacy guarantees. In short, RAPPORs allow the forest of client data to be studied, without permitting the possibility of looking at individual tr... | 4 | cs.CR |
1,983,815,018 | Increasing Flash Memory Lifetime by Dynamic Voltage Allocation for Constant Mutual Information | The read channel in Flash memory systems degrades over time because the Fowler-Nordheim tunneling used to apply charge to the floating gate eventually compromises the integrity of the cell because of tunnel oxide degradation. While degradation is commonly measured in the number of program/erase cycles experienced by a ... | 28 | cs.IT |
1,984,398,168 | Proof Pad a New Development Environment for Acl2 | Most software development projects rely on Integrated Development Environments (IDEs) based on the desktop paradigm, with an interactive, mouse-driven user interface. The standard installation of ACL2, on the other hand, is designed to work closely with Emacs. ACL2 experts, on the whole, like this mode of operation, bu... | 23 | cs.SE |
1,994,596,572 | The Role of Peer Influence in Churn in Wireless Networks | Subscriber churn remains a top challenge for wireless carriers. These carriers need to understand the determinants of churn to confidently apply effective retention strategies to ensure their profitability and growth. In this paper, we look at the effect of peer influence on churn and we try to disentangle it from othe... | 26 | cs.SI |
2,000,628,897 | Off the Grid Spectral Compressed Sensing with Prior Information | Recent research in off-the-grid compressed sensing (CS) has demonstrated that, under certain conditions, one can successfully recover a spectrally sparse signal from a few time-domain samples even though the dictionary is continuous. In this paper, we extend off-the-grid CS to applications where some prior information ... | 28 | cs.IT |
2,001,557,365 | A Regularized Graph Layout Framework for Dynamic Network Visualization | Many real-world networks, including social and information networks, are dynamic structures that evolve over time. Such dynamic networks are typically visualized using a sequence of static graph layouts. In addition to providing a visual representation of the network structure at each time step, the sequence should pre... | 26 | cs.SI |
2,001,699,728 | Area Coverage Under Low Sensor Density | This paper presents a solution to the problem of monitoring a region of interest (RoI) using a set of nodes that is not sufficient to achieve the required degree of monitoring coverage. In particular, sensing coverage of wireless sensor networks (WSNs) is a crucial issue in projects due to failure of sensors. The lack ... | 8 | cs.NI |
2,001,942,931 | Fast Resource Scheduling in Hetnets with D2d Support | Resource allocation in LTE networks is known to be an NP-hard problem. In this paper, we address an even more complex scenario: an LTE-based, 2-tier heterogeneous network where D2D mode is supported under the network control. All communications (macrocell, microcell and D2D-based) share the same frequency bands, hence ... | 8 | cs.NI |
2,005,285,092 | How to Transfer Zero Shot Object Recognition via Hierarchical Transfer of Semantic Attributes | Attribute based knowledge transfer has proven very successful in visual object analysis and learning previously unseen classes. However, the common approach learns and transfers attributes without taking into consideration the embedded structure between the categories in the source set. Such information provides import... | 16 | cs.CV |
2,008,604,527 | A General Quantitative Cryptanalysis of Permutation Only Multimedia Ciphers against Plaintext Attacks | In recent years secret permutations have been widely used for protecting different types of multimedia data, including speech files, digital images and videos. Based on a general model of permutation-only multimedia ciphers, this paper performs a quantitative cryptanalysis on the performance of these kind of ciphers ag... | 4 | cs.CR |
2,009,318,757 | An Efficient Assignment of Drainage Direction over Flat Surfaces in Raster Digital Elevation Models | In processing raster digital elevation models (DEMs) it is often necessary to assign drainage directions over flats-that is, over regions with no local elevation gradient. This paper presents an approach to drainage direction assignment which is not restricted by a flat's shape, number of outlets, or surrounding topogr... | 34 | cs.DS |
2,010,239,981 | Whittlesearch Interactive Image Search with Relative Attribute Feedback | We propose a novel mode of feedback for image search, where a user describes which properties of exemplar images should be adjusted in order to more closely match his/her mental model of the image sought. For example, perusing image results for a query "black shoes", the user might state, "Show me shoe images like thes... | 16 | cs.CV |
2,023,346,713 | Conflict Driven Asp Solving with External Sources | Answer Set Programming (ASP) is a well-known problem solving approach based on nonmonotonic logic programs and efficient solvers. To enable access to external information, hex-programs extend programs with external atoms, which allow for a bidirectional communication between the logic program and external sources of co... | 10 | cs.AI |
2,023,669,216 | Validity of Altmetrics Data for Measuring Societal Impact a Study Using Data From Altmetric and F1000prime | Can altmetric data be validly used for the measurement of societal impact? The current study seeks to answer this question with a comprehensive dataset (about 100,000 records) from very disparate sources (F1000, Altmetric, and an in-house database based on Web of Science). In the F1000 peer review system, experts attac... | 38 | cs.DL |
2,029,741,572 | Leader Contention Based User Matching for 802 11 Multiuser Mimo Networks | In multiuser MIMO (MU-MIMO) LANs, the achievable throughput of a client depends on who is transmitting concurrently with it. Existing MU-MIMO MAC protocols, however, enable clients to use the traditional 802.11 contention to contend for concurrent transmission opportunities on the uplink. Such a contention-based protoc... | 8 | cs.NI |
2,039,623,973 | Inertial Parameter Identification Including Friction and Motor Dynamics | Identification of inertial parameters is fundamental for the implementation of torque-based control in humanoids. At the same time, good models of friction and actuator dynamics are critical for the low-level control of joint torques. We propose a novel method to identify inertial, friction and motor parameters in a si... | 27 | cs.RO |
2,044,357,496 | Verifiable Source Code Documentation in Controlled Natural Language | Writing documentation about software internals is rarely considered a rewarding activity. It is highly time-consuming and the resulting documentation is fragile when the software is continuously evolving in a multi-developer setting. Unfortunately, traditional programming environments poorly support the writing and mai... | 23 | cs.SE |
2,045,492,734 | How to Improve the Outcome of Performance Evaluations in Terms of Percentiles for Citation Frequencies of My Papers | Using empirical data I demonstrate that the result of performance evaluations by percentiles can be drastically influenced by the proper choice of the journal in which a manuscript is published. | 38 | cs.DL |
2,046,927,882 | Cooperative Estimation for Synchronization of Heterogeneous Multi Agent Systems Using Relative Information | Abstract In this paper, we present a distributed estimation setup where local agents estimate their states from relative measurements received from their neighbours. In the case of heterogeneous multi-agent systems, where only relative measurements are available, this is of high relevance. The objective is to improve... | 19 | cs.SY |
2,049,223,024 | A Cooperative Q Learning Approach for Real Time Power Allocation in Femtocell Networks | In this paper, we address the problem of distributed interference management of cognitive femtocells that share the same frequency range with macrocells (primary user) using distributed multi-agent Q-learning. We formulate and solve three problems representing three different Q-learning algorithms: namely, centralized,... | 11 | cs.MA |
2,052,978,498 | Fusing Text and Image for Event Detection in Twitter | In this contribution, we develop an accurate and effective event detection method to detect events from a Twitter stream, which uses visual and textual information to improve the performance of the mining process. The method monitors a Twitter stream to pick up tweets having texts and images and stores them into a data... | 31 | cs.IR |
2,054,156,261 | Artificial Intelligence Markup Language a Brief Tutorial | The purpose of this paper is to serve as a reference guide for the development of chatterbots implemented with the AIML language. In order to achieve this, the main concepts in Pattern Recognition area are described because the AIML uses such theoretical framework in their syntactic and semantic structures. After that,... | 10 | cs.AI |
2,056,465,590 | Anomaly Detection in Online Social Networks | Anomalies in online social networks can signify irregular, and often illegal behaviour. Anomalies in online social networks can signify irregular, and often illegal behaviour. Detection of such anomalies has been used to identify malicious individuals, including spammers, sexual predators, and online fraudsters. In thi... | 26 | cs.SI |
2,058,503,096 | Efficient Synthesis of Network Updates | Software-defined networking (SDN) is revolutionizing the networking industry, but current SDN programming platforms do not provide automated mechanisms for updating global configurations on the fly. Implementing updates by hand is challenging for SDN programmers because networks are distributed systems with hundreds or... | 22 | cs.PL |
2,065,627,966 | Cooperative Relaying Under Spatially and Temporally Correlated Interference | We analyze the performance of an interference-limited decode-and-forward cooperative relaying system that comprises a source, a destination, and $N$ relays, arbitrarily placed on the plane and suffering from interference by a set of interferers placed according to a spatial Poisson process. In each transmission at... | 28 | cs.IT |
2,067,340,979 | An Information Theoretic Location Verification System for Wireless Networks | As location-based applications become ubiquitous in emerging wireless networks, a reliable Location Verification System (LVS) will be of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the thres... | 28 | cs.IT |
2,067,949,855 | Petri Nets with Time and Cost | We consider timed Petri nets, i.e., unbounded Petri nets where each token carries a real-valued clock. Transition arcs are labeled with time intervals, which specify constraints on the ages of tokens. Our cost model assigns token storage costs per time unit to places, and firing costs to transitions. We study the cost ... | 2 | cs.LO |
2,069,293,554 | Novelty Detection Under Multi Label Multi Instance Framework | Novelty detection plays an important role in machine learning and signal processing. This paper studies novelty detection in a new setting where the data object is represented as a bag of instances and associated with multiple class labels, referred to as multi-instance multi-label (MIML) learning. Contrary to the comm... | 24 | cs.LG |
2,074,934,005 | Analysis and Design of Multi Hop Diffusion Based Molecular Communication Networks | In this paper, we consider a multi-hop molecular communication network consisting of one nanotransmitter, one nanoreceiver, and multiple nanotransceivers acting as relays. We consider three different relaying schemes to improve the range of diffusion-based molecular communication. In the first scheme, different types o... | 28 | cs.IT |
2,079,489,844 | Strategic Port Graph Rewriting an Interactive Modelling and Analysis Framework | We present strategic portgraph rewriting as a basis for the implementation of visual modelling and analysis tools. The goal is to facilitate the specification, analysis and simulation of complex systems, using port graphs. A system is represented by an initial graph and a collection of graph rewriting rules, together w... | 2 | cs.LO |
2,083,965,535 | Iec 61499 Vs 61131 a Comparison Based on Misperceptions | The IEC 61131 standard has been widely#R##N#accepted in the industrial automation domain. However, it is claimed that the#R##N#standard does not address today the new requirements of complex industrial#R##N#systems, which include among others, portability, interoperability, increased#R##N#reusability and distribution. ... | 23 | cs.SE |
2,088,442,093 | On Covert Acoustical Mesh Networks in Air | Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We construct a covert channel between different computing systems that utilizes audio modulation/demodulation to exchange data between the computing s... | 4 | cs.CR |
2,094,380,852 | High Energy First Hef Heuristic for Energy Efficient Target Coverage Problem | Target coverage problem in wireless sensor networks is concerned with maximizing the lifetime of the network while continuously monitoring a set of targets. A sensor covers targets which are within the sensing range. For a set of sensors and a set of targets, the sensor-target coverage relationship is assumed to be kno... | 8 | cs.NI |
2,096,761,913 | Faster Radix Sort via Virtual Memory and Write Combining | Sorting algorithms are the deciding factor for the performance of common operations such as removal of duplicates or database sort-merge joins. This work focuses on 32-bit integer keys, optionally paired with a 32-bit value. We present a fast radix sorting algorithm that builds upon a microarchitecture-aware variant of... | 34 | cs.DS |
2,097,759,652 | Detecting Intentional Packet Drops on the Internet via Tcp Ip Side Channels Extended Version | We describe a method for remotely detecting intentional packet drops on the Internet via side channel inferences. That is, given two arbitrary IP addresses on the Internet that meet some simple requirements, our proposed technique can discover packet drops (e.g., due to censorship) between the two remote machines, as w... | 8 | cs.NI |
2,099,527,426 | Cognitive and Cache Enabled D2d Communications in Cellular Networks | Caching popular contents for frequent access is an attractive way of employing the redundancy of user requests. Exploiting cognition to the cache-enabled D2D in the multichannel cellular network is the main focus of this paper. We contribute to analyzing the cache-based content delivery in a twotier heterogeneous netwo... | 28 | cs.IT |
2,100,725,109 | Using Transmit Only Sensors to Reduce Deployment Cost of Wireless Sensor Networks | We consider a hybrid wireless sensor network with regular and transmit-only sensors. The transmit-only sensors do not have the receiver circuit (or have a very low data-rate one), hence are cheaper and less energy consuming, but their transmissions cannot be coordinated. Regular sensors, also called cluster-heads, are ... | 8 | cs.NI |
2,104,308,413 | High Sir Transmission Capacity of Wireless Networks with General Fading and Node Distribution | In many wireless systems, interference is the main performance-limiting factor, and is primarily dictated by the locations of concurrent transmitters. In many earlier works, the locations of the transmitters is often modeled as a Poisson point process for analytical tractability. While analytically convenient, the PPP ... | 28 | cs.IT |
2,109,463,955 | Towards a Multi Criteria Development Distribution Model an Analysis of Existing Task Distribution Approaches | Distributing development tasks in the context of global software development bears both many risks and many opportunities. Nowadays, distributed development is often driven by only a few factors or even just a single factor such as workforce costs. Risks and other relevant factors such as workforce capabilities, the in... | 23 | cs.SE |
2,114,297,064 | Dynamic Autotuning of Adaptive Fast Multipole Methods on Hybrid Multicore Cpu and Gpu Systems | Dynamic autotuning of adaptive fast multipole methods on hybrid multicore CPU and GPU systems | 5 | cs.DC |
2,117,327,438 | Efficient Reconciliation Protocol for Discrete Variable Quantum Key Distribution | Reconciliation is an essential part of any secret-key agreement protocol and hence of a Quantum Key Distribution (QKD) protocol, where two legitimate parties are given correlated data and want to agree on a common string in the presence of an adversary, while revealing a minimum amount of information. In this paper, we... | 28 | cs.IT |
2,128,095,813 | Dolfin Automated Finite Element Computing | We describe here a library aimed at automating the solution of partial differential equations using the finite element method. By employing novel techniques for automated code generation, the library combines a high level of expressiveness with efficient computation. Finite element variational forms may be expressed in... | 32 | cs.MS |
2,130,190,443 | Test Bed Based Comparison of Single and Parallel Tcp and the Impact of Parallelism on Throughput and Fairness in Heterogenous Networks | Parallel Transport Control Protocol (TCP) has been used to effectively utilize bandwidth for data intensive applications over high Bandwidth-Delay Product (BDP) networks. On the other hand, it has been argued that, a single based TCP connection with proper modification such as HSTCP can emulate and capture the robustne... | 8 | cs.NI |
2,131,830,786 | Navigation Domain Representation for Interactive Multiview Imaging | Enabling users to interactively navigate through different viewpoints of a static scene is a new interesting functionality in 3D streaming systems. While it opens exciting perspectives toward rich multimedia applications, it requires the design of novel representations and coding techniques to solve the new challenges ... | 1 | cs.MM |
2,132,690,206 | An Analysis of Device Free and Device Based Wifi Localization Systems | WiFi-based localization became one of the main indoor localization techniques due to the ubiquity of WiFi connectivity. However, indoor environments exhibit complex wireless propagation characteristics. Typically, these characteristics are captured by constructing a fingerprint map for the different locations in the ar... | 8 | cs.NI |
2,136,787,699 | Design and Analysis of a Multi Carrier Differential Chaos Shift Keying Communication System | A new Multi-Carrier Differential Chaos Shift Keying (MC-DCSK) modulation is presented in this paper. The system endeavors to provide a good trade-off between robustness, energy efficiency and high data rate, while still being simple compared to conventional multi-carrier spread spectrum systems. This system can be seen... | 21 | cs.OH |
2,136,961,259 | Depechemood a Lexicon for Emotion Analysis From Crowd Annotated News | While many lexica annotated with words polarity are available for sentiment analysis, very few tackle the harder task of emotion analysis and are usually quite limited in coverage. In this paper, we present a novel approach for extracting - in a totally automated way - a high-coverage and high-precision lexicon of roug... | 30 | cs.CL |
2,137,586,949 | A Framework for Specifying Prototyping and Reasoning About Computational Systems | This thesis concerns the development of a framework that facilitates the design and analysis of formal systems. Specifically, this framework is intended to provide (1) a specification language which supports the concise and direct description of a system based on its informal presentation, (2) a mechanism for animating... | 2 | cs.LO |
2,137,768,004 | Hierarchical Hidden Markov Model in Detecting Activities of Daily Living in Wearable Videos for Studies of Dementia | This paper presents a method for indexing activities of daily living in videos acquired from wearable cameras. It addresses the problematic of analyzing the complex multimedia data acquired from wearable devices, which has been recently a growing concern due to the increasing amount of this kind of multimedia data. In ... | 1 | cs.MM |
2,146,699,143 | A Degree Centrality in Multi Layered Social Network | Multi-layered social networks reflect complex relationships existing in modern interconnected IT systems. In such a network each pair of nodes may be linked by many edges that correspond to different communication or collaboration user activities. Multi-layered degree centrality for multi-layered social networks is pre... | 26 | cs.SI |
2,148,698,193 | Four Conceptions of Instruction Sequence Faults | The notion of an instruction sequence fault is considered from various perspectives. Four different viewpoints on what constitutes a fault, or how to use the notion of a fault, are formulated. An integration of these views is proposed. | 23 | cs.SE |
2,149,210,625 | A Game Theoretic Analysis of Incentives in Content Production and Sharing over Peer to Peer Networks | Peer-to-peer (P2P) networks can be easily deployed to distribute user-generated content at a low cost, but the free-rider problem hinders the efficient utilization of P2P networks. Using game theory, we investigate incentive schemes to overcome the free-rider problem in content production and sharing. We build a basic ... | 8 | cs.NI |
2,151,152,358 | Subjective and Objective Quality Assessment of Image a Survey | With the increasing demand for image-based applications, the efficient and reliable evaluation of image quality has increased in importance. Measuring the image quality is of fundamental importance for numerous image processing applications, where the goal of image quality assessment (IQA) methods is to automatically e... | 1 | cs.MM |
2,152,297,266 | Convergence Analysis Using the Edge Laplacian Robust Consensus of Nonlinear Multi Agent Systems via Iss Method | This study develops an original and innovative matrix representation with respect to the information flow for networked multi-agent system. To begin with, the general concepts of the edge Laplacian of digraph are proposed with its algebraic properties. Benefit from this novel graph-theoretic tool, we can build a bridge... | 19 | cs.SY |
End of preview.
Multi-Scale Heterogeneous Text-Attributed Graph Datasets From Diverse Domains
- Multi Scales. Our HTAG datasets span multiple scales, ranging from small (24K nodes, 104K edges) to large (5.6M nodes, 29.8M edges). Smaller datasets are suitable for testing computationally intensive algorithms, while larger datasets, such as DBLP and Patent, support the development of scalable models that leverage mini-batching and distributed training.
- Diverse Domains. Our HTAG datasets include heterogeneous graphs that are representative of a wide range of domains: movie collaboration, community question answering, academic, book publication, and patent application. The broad coverage of domains empowers the development and demonstration of graph foundation models and helps differentiate them from domain-specific approaches.
- Realistic and Reproducible Evaluation. We provide an automated evaluation pipeline for HTAGs that streamlines data processing, loading, and model evaluation, ensuring seamless reproducibility. Additionally, we employ time-based data splits for each dataset, which offer a more realistic and meaningful evaluation compared to traditional random splits.
- Open-source Code for Dataset Construction. We have released the complete code for constructing our HTAG datasets, allowing researchers to build larger and more complex heterogeneous text-attribute graph datasets. For example, the CroVal dataset construction code can be used to create web-scale community question-answering networks, such as those derived from StackExchange data dumps. This initiative aims to further advance the field by providing the tools necessary for replicating and extending our datasets for a wide range of applications.
Download
from huggingface_hub import snapshot_download
# Download all
snapshot_download(repo_id="Cloudy1225/HTAG", repo_type="dataset", local_dir="./data")
# Or just download heterogeneous graphs and PLM-based node features
snapshot_download(repo_id="Cloudy1225/HTAG", repo_type="dataset", local_dir="./data", allow_patterns="*.pkl")
# Or just download raw texts
snapshot_download(repo_id="Cloudy1225/HTAG", repo_type="dataset", local_dir="./data", allow_patterns=["*.csv", "*.csv.zip"])
Dataset Format
The dataset includes heterogeneous graph edges, raw text, PLM-based features, labels, and years associated with text-attributed nodes. Raw text is provided in .csv or .csv.zip files, while the remaining data are stored in a dictionary object within a .pkl file. For example, by reading the tmdb.pkl file, the following dictionary can be obtained:
{'movie-actor': (array([ 0, 0, 0, ..., 7504, 7504, 7504], dtype=int16),
array([ 0, 1, 2, ..., 11870, 1733, 11794], dtype=int16)),
'movie-director': (array([ 0, 0, 0, ..., 7503, 7503, 7504], dtype=int16),
array([ 0, 1, 2, ..., 3423, 966, 2890], dtype=int16)),
'movie_labels': array([3, 1, 1, ..., 1, 1, 2], dtype=int8),
'movie_feats': array([[ 0.00635284, 0.00649689, 0.01250827, ..., 0.06342042,
-0.01747945, 0.0134356 ],
[-0.14075027, 0.02825641, 0.02670695, ..., -0.12270895,
0.08417314, 0.02486392],
[ 0.00014208, -0.02286632, 0.00615967, ..., -0.03311544,
0.04735276, -0.07458566],
...,
[ 0.01835816, 0.07484645, -0.08099765, ..., -0.00150019,
0.01669764, 0.00456595],
[-0.00821487, -0.10434289, 0.01928608, ..., -0.06343049,
0.05060194, -0.04229118],
[-0.06465845, 0.13461556, -0.01640793, ..., -0.06274845,
0.04002513, -0.00751513]], dtype=float32),
'movie_years': array([2013, 1995, 1989, ..., 1939, 1941, 1965], dtype=int16)}
Dataset Statistics
| # Nodes | # Edges | # Classes | # Splits | |
|---|---|---|---|---|
| TMDB | 24,412 | 104,858 | 4 | Train: 5,698 |
| Movie: 7,505 | Movie-Actor: 86,517 | Valid: 711 | ||
| Actor: 13,016 | Movie-Director: 18,341 | Test: 1,096 | ||
| Director: 3,891 | ||||
| CroVal | 44386 | 164,981 | 6 | Train: 980 |
| Question: 34153 | Question-Question: 46,269 | Valid: 1,242 | ||
| User: 8898 | Question-User: 34,153 | Test: 31,931 | ||
| Tag: 1335 | Question-Tag: 84,559 | |||
| ArXiv | 231,111 | 2,075,692 | 40 | Train: 47,084 |
| Paper: 81,634 | Paper-Paper: 1,019,624 | Valid: 18,170 | ||
| Author: 127,590 | Paper-Author: 300,233 | Test: 16,380 | ||
| FoS: 21,887 | Paper-FoS: 755,835 | |||
| Book | 786,257 | 9,035,291 | 8 | Train: 330,201 |
| Book | Book-Book: 7,614,902 | Valid: 57,220 | ||
| Author | Book-Author: 825,905 | Test: 207,063 | ||
| Publisher | Book-Publisher: 594,484 | |||
| DBLP | 1,989,010 | 29,830,033 | 9 | Train: 508,464 |
| Paper: 964350 | Paper-Paper: 16,679,526 | Valid: 158,891 | ||
| Author: 958961 | Paper-Author: 3,070,343 | Test: 296,995 | ||
| FoS: 65699 | Paper-FoS: 10,080,164 | |||
| Patent | 5,646,139 | 8,833,738 | 120 | Train: 1,705,155 |
| Patent: 2,762,187 | Patent-Inventor: 6,071,551 | Valid: 374,275 | ||
| Inventor: 2,873,311 | Patent-Examiner: 2,762,187 | Test: 682,757 | ||
| Examiner: 10,641 |
Dataset Construction
The code for dataset construction can be found in each graph_builder.ipynb file. Please see README.md in each subfolder for more details .
- Downloads last month
- 75