Datasets:
text stringlengths 29 3.76k | label stringclasses 8
values |
|---|---|
The goal of this paper is to define and analyze systems which exhibit brittle
behavior. This behavior is characterized by a sudden and steep decline in
performance as the system approaches the limits of tolerance. This can be due
to input parameters which exceed a specified input, or environmental conditions
which exce... | cs.* |
In this paper we show that the initial philosophy used in designing and
developing UNIX in early times has been forgotten due to "fast practices". We
question the leitmotif that microkernels, though being by design adherent to
the KISS principle, have a number of context switches higher than their
monolithic counterpar... | cs.* |
Conventional object-stores are built on top of traditional OS storage stack,
where I/O requests typically transfers through multiple hefty and redundant
layers. The complexity of object management has grown dramatically with the
ever increasing requirements of performance, consistency and fault-tolerance
from storage s... | cs.* |
This example of Clifford algebras calculations uses GiNaC
(http://www.ginac.de/) library, which includes a support for generic Clifford
algebra starting from version~1.3.0. Both symbolic and numeric calculation are
possible and can be blended with other functions of GiNaC. This calculations
was made for the paper math.... | cs.* |
Graphics Processing Units (GPUs) have traditionally relied on the host CPU to
initiate access to the data storage. This approach is well-suited for GPU
applications with known data access patterns that enable partitioning of their
dataset to be processed in a pipelined fashion in the GPU. However, emerging
applications... | cs.* |
This is the summary of first three years of activity of the EURETILE FP7
project 247846. EURETILE investigates and implements brain-inspired and
fault-tolerant foundational innovations to the system architecture of massively
parallel tiled computer architectures and the corresponding programming
paradigm. The execution... | cs.* |
The author argues to Silicon Valley that the most important and powerful part
of computer science is work that is simultaneously theoretical and practical.
He particularly considers the intersection of the theory of algorithms and
practical software development. He combines examples from the development of
the TeX type... | cs.* |
All information about physical objects including humans, buildings,
processes, and organizations will be online. This trend is both desirable and
inevitable. Cyberspace will provide the basis for wonderful new ways to inform,
entertain, and educate people. The information and the corresponding systems
will streamline c... | cs.* |
Charles Babbage's vision of computing has largely been realized. We are on
the verge of realizing Vannevar Bush's Memex. But, we are some distance from
passing the Turing Test. These three visions and their associated problems have
provided long-range research goals for many of us. For example, the scalability
problem ... | cs.* |
Issues related to a materialist philosophy are explored as concerns the
implied equivalence of computers running software and human observers. One
issue explored concerns the measurement process in quantum mechanics. Another
issue explored concerns the nature of experience as revealed by the existence
of dreams. Some d... | cs.* |
Computer scientists are in the position to create new, free high-quality
journals. So what would it take? | cs.* |
ENUM marks either the convergence or collision of the public telephone
network with the Internet. ENUM is an innovation in the domain name system
(DNS). It starts with numerical domain names that are used to query DNS name
servers. The servers respond with address information found in DNS records.
This can be telephone... | cs.* |
We discuss the scientific contributions of Edsger Wybe Dijkstra, his opinions
and his legacy. | cs.* |
In this work we firstly review some results in Classical Information Theory.
Next, we try to generalize these results by using the Tsallis entropy. We
present a preliminary result and discuss our aims in this field. | cs.* |
The main ideas behind developments in the theory and technology of quantum
computation were formulated in the late 1970s and early 1980s by two physicists
in the West and a mathematician in the former Soviet Union. It is not generally
known in the West that the subject has roots in the Russian technical
literature. The... | cs.* |
The (non-initialized, non-deterministic) asynchronous systems (in the
input-output sense) are multi-valued functions from m-dimensional signals to
sets of n-dimensional signals, the concept being inspired by the modeling of
the asynchronous circuits. Our purpose is to state the problem of the their
stability. | cs.* |
The latches are simple circuits with feedback from the digital electrical
engineering. We have included in our work the C element of Muller, the RS
latch, the clocked RS latch, the D latch and also circuits containing two
interconnected latches: the edge triggered RS flip-flop, the D flip-flop, the
JK flip-flop, the T ... | cs.* |
The chapter from the book introduces the delay theory, whose purpose is the
modeling of the asynchronous circuits from digital electrical engineering with
ordinary and differential pseudo-boolean equations. | cs.* |
The technical challenges of scaling websites with large and growing member
bases, like social networking sites, are numerous. One of these challenges is
how to evenly distribute the growing member base across all available
resources. This paper will explore various methods that address this issue. The
techniques used i... | cs.* |
This is a rough draft synopsis of a book presently in preparation. This book
provides a systematic critique of the software industry. This critique is
accomplished using classical methods in practical design science. | cs.* |
The asynchronous systems $f$ are the models of the asynchronous circuits from
digital electrical engineering. They are multi-valued functions that associate
to each input $u:\mathbf{R}\to \{0,1\}^{m}$ a set of states $x\in f(u),$ where
$x:\mathbf{R}\to \{0,1\}^{n}.$ The intersection of the systems allows adding
supplem... | cs.* |
Computer science is seeing a decline in enrollment at all levels of
education, including undergraduate and graduate study. This paper reports on
the results of a study conducted at the University of Illinois at
Urbana-Champaign which evaluated students attitudes regarding three areas which
can contribute to improved en... | cs.* |
We propose a soft-output detection scheme for Multiple-Input-Multiple-Output
(MIMO) systems. The detector employs Markov Chain Monte Carlo method to compute
bit reliabilities from the signals received and is thus suited for coded MIMO
systems. It offers a good trade-off between achievable performance and
algorithmic co... | cs.* |
Modern society is permeated with computers, and the software that controls
them can have latent, long-term, and immediate effects that reach far beyond
the actual users of these systems. This places researchers in Computer Science
and Software Engineering in a critical position of influence and
responsibility, more tha... | cs.* |
This paper documents the formation of the European Spreadsheet Risks Interest
Group (EuSpRIG www.eusprig.org) and outlines some of the research undertaken
and reported upon by interested parties in EuSpRIG publications | cs.* |
The latches are simple circuits with feedback from the digital electrical
engineering. We have included in our work the C element of Muller, the RS
latch, the clocked RS latch, the D latch and also circuits containing two
interconnected latches: the edge triggered RS flip-flop, the D flip-flop, the
JK flip-flop, the T ... | cs.* |
The asynchronous systems are the models of the asynchronous circuits from the
digital electrical engineering and non-anticipation is one of the most
important properties in systems theory. Our present purpose is to introduce
several concepts of non-anticipation of the asynchronous systems. | cs.* |
This Master of Science in Computer and Information Sciences (MICS) is an
international accredited master program that has been initiated in 2004 and
started in September 2005. MICS is a research-oriented academic study of 4
semesters and a continuation of the Bachelor towards the PhD. It is completely
taught in English... | cs.* |
The increasing relevance of areas such as real-time and embedded systems,
pervasive computing, hybrid systems control, and biological and social systems
modeling is bringing a growing attention to the temporal aspects of computing,
not only in the computer science domain, but also in more traditional fields of
engineer... | cs.* |
Development organizations and International Non-Governmental Organizations
have been emphasizing the high potential of Free and Open Source Software for
the Less Developed Countries. Cost reduction, less vendor dependency and
increased potential for local capacity development have been their main
arguments. In spite of... | cs.* |
The dialogue develops arguments for and against adopting a new world system,
info-computationalist naturalism, that is poised to replace the traditional
mechanistic world system. We try to figure out what the info-computational
paradigm would mean, in particular its pancomputationalism. We make some steps
towards devel... | cs.* |
We introduce a new visual analytic approach to the study of scientific
discoveries and knowledge diffusion. Our approach enhances contemporary
co-citation network analysis by enabling analysts to identify co-citation
clusters of cited references intuitively, synthesize thematic contexts in which
these clusters are cite... | cs.* |
A significant amount of high-impact contemporary scientific research occurs
where biology, computer science, engineering and chemistry converge. Although
programmes have been put in place to support such work, the complex dynamics of
interdisciplinarity are still poorly understood. In this paper we interrogate
the natu... | cs.* |
The historical development has lead to the decay of Natural Philosophy which
until 19th century included all of our knowledge about the physical world into
the growing multitude of specialized sciences. The focus on the in-depth
enquiry disentangled from its broad context lead to the problem of loss of
common world-vie... | cs.* |
Alan Turing's pioneering work on computability, and his ideas on
morphological computing support Andrew Hodges' view of Turing as a natural
philosopher. Turing's natural philosophy differs importantly from Galileo's
view that the book of nature is written in the language of mathematics (The
Assayer, 1623). Computing is... | cs.* |
Although the history of informatics is recent, this field poses unusual
problems with respect to its preservation. These problems are amplified by
legal issues, digital law being in itself a subject matter whose history is
also worth presenting in a computer science museum. The purpose of this paper
is to present a qui... | cs.* |
This text presents the research field of natural/unconventional computing as
it appears in the book COMPUTING NATURE. The articles discussed consist a
selection of works from the Symposium on Natural Computing at AISB-IACAP
(British Society for the Study of Artificial Intelligence and the Simulation of
Behaviour and Th... | cs.* |
A significant amount of high-impact contemporary scientific research occurs
where biology, computer science, engineering and chemistry converge. Although
programmes have been put in place to support such work, the complex dynamics of
interdisciplinarity are still poorly understood. In this paper we highlight
potential ... | cs.* |
The century of complexity has come. The face of science has changed.
Surprisingly, when we start asking about the essence of these changes and then
critically analyse the answers, the result are mostly discouraging. Most of the
answers are related to the properties that have been in the focus of scientific
research alr... | cs.* |
We need much better understanding of information processing and computation
as its primary form. Future progress of new computational devices capable of
dealing with problems of big data, internet of things, semantic web, cognitive
robotics and neuroinformatics depends on the adequate models of computation. In
this art... | cs.* |
How to manage knowledge on the Web. | cs.* |
In a recent article, Luciano Floridi explains his view of Turing's legacy in
connection to the philosophy of information. I will very briefly survey one of
Turing's other contributions to the philosophy of information and computation,
including similarities to Shannon's own methodological approach to information
throug... | cs.* |
Over 15 years of teaching, advising students and coordinating scientific
research activities and projects in computer science, we have observed the
difficulties of students to write scientific papers to present the results of
their research practices. In addition, they repeatedly have doubts about the
publishing proces... | cs.* |
The problem of the Hanoi Tower is a classic exercise in recursive
programming: the solution has a simple recursive definition, and its complexity
and the matching lower bound are the solution of a simple recursive function
(the solution is so easy that most students memorize it and regurgitate it at
exams without truly... | cs.* |
Incompleteness theorems of Godel, Turing, Chaitin, and Algorithmic
Information Theory have profound epistemological implications. Incompleteness
limits our ability to ever understand every observable phenomenon in the
universe. Incompleteness limits the ability of evolutionary processes from
finding optimal solutions. ... | cs.* |
In 1632, Galileo Galilei wrote a book called \textit{Dialogue Concerning the
Two Chief World Systems} which compared the new Copernican model of the
universe with the old Ptolemaic model. His book took the form of a dialogue
between three philosophers, Salviati, a proponent of the Copernican model,
Simplicio, a propone... | cs.* |
I describe my path to unconventionality in my exploration of theoretical and
applied aspects of computation towards revealing the algorithmic and
reprogrammable properties and capabilities of the world, in particular related
to applications of algorithmic complexity in reshaping molecular biology and
tackling the chall... | cs.* |
Researchers spend a great deal of time reading research papers. Keshav (2012)
provides a three-pass method to researchers to improve their reading skills.
This article extends Keshav's method for reading a research compendium.
Research compendia are an increasingly used form of publication, which packages
not only the ... | cs.* |
The article presents the main milestones of the science and technology
biography of Ivan Edward Sutherland. The influence of the family and the school
on the development of its research competencies is shown, and little-known
biographical facts explaining the evolution of his scientific interests is
presented: from dyn... | cs.* |
We argue that the boldest claims of Big Data are in need of revision and
toning-down, in view of a few basic lessons learned from the science of complex
systems. We point out that, once the most extravagant claims of Big Data are
properly discarded, a synergistic merging of BD with big theory offers
considerable potent... | cs.* |
Machine learning and deep learning techniques are contributing much to the
advancement of science. Their powerful predictive capabilities appear in
numerous disciplines, including chaotic dynamics, but they miss understanding.
The main thesis here is that prediction and understanding are two very
different and importan... | cs.* |
In this survey, we explore Andrei Nikolayevich Kolmogorov's seminal work in
just one of his many facets: its influence Computer Science especially his
viewpoint of what herein we call 'Algorithmic Theory of Informatics.'
Can a computer file 'reduce' its 'size' if we add to it new symbols? Do
equations of state like s... | cs.* |
Research methods are essential parts in conducting any research project.
Although they have been theorized and summarized based on best practices, every
field of science requires an adaptation of the overall approaches to perform
research activities. In addition, any specific research needs a particular
adjustment to t... | cs.* |
This paper aims to introduce an application to Kalman Filtering Theory, which
is rather unconventional. Recent experiments have shown that many natural
phenomena, especially from ecology or meteorology, could be monitored and
predicted more accurately when accounting their evolution over some
geographical area. Thus, t... | cs.* |
The number of research papers written has been growing at least linearly --
if not exponentially -- in recent years. In proportion, the amount of time a
reader allocates per paper has been decreasing. While an accessible paper will
be appreciated by a large audience, hard-to-read papers may remain obscure for
a long ti... | cs.* |
This article is a multiauthored portrait of Edsger Wybe Dijkstra that
consists of testimonials written by several friends, colleagues, and students
of his. It provides unique insights into his personality, working style and
habits, and his influence on other computer scientists, as a researcher,
teacher, and mentor. | cs.* |
Computer science has grown rapidly since its inception in the 1950s and the
pioneers in the field are celebrated annually by the A.M. Turing Award. In this
paper, we attempt to shed light on the path to influential computer scientists
by examining the characteristics of the 72 Turing Award laureates. To achieve
this go... | cs.* |
In theoretical computer science, conferences play an important role in the
scientific process. The decisions whether to accept or reject articles is taken
by the program committee (PC) members. Serving on a PC for the first time can
be a daunting experience. This guide will help new program-committee members to
underst... | cs.* |
We propose a study of the constitution of meaning in human-computer
interaction based on Turing and Wittgenstein's definitions of thought,
understanding, and decision. We show by the comparative analysis of the
conceptual similarities and differences between the two authors that the common
sense between humans and mach... | cs.* |
The asynchronous systems f are multi-valued functions, representing the
non-deterministic models of the asynchronous circuits from the digital
electrical engineering. In real time, they map an 'admissible input' function
u:R\rightarrow{0,1}^{m} to a set f(u) of 'possible states' x\inf(u), where
x:R\rightarrow{0,1}^{m}.... | cs.* |
The P=?NP problem is philosophically solved by showing P is equal to NP in
the random access with unit multiply (MRAM) model. It is shown that the MRAM
model empirically best models computation hardness. The P=?NP problem is shown
to be a scientific rather than a mathematical problem. The assumptions involved
in the cu... | cs.* |
Personal reflections are given on being students of Helmut J\"urgensen. Then,
we attempt to address his hypothesis that informatics follows trend-like
behaviours through the use of a content analysis of university job
advertisements, and then via simulation techniques from the area of
quantitative economics. | cs.* |
Many of the computing systems programmed using Machine Learning are opaque:
it is difficult to know why they do what they do or how they work. The
Explainable Artificial Intelligence research program aims to develop analytic
techniques with which to render opaque computing systems transparent, but lacks
a normative fra... | cs.* |
The last decade witnessed a renewed interest in the development of the
Italian computer industry and in the role of the Fifties pioneers in Rome,
Milan, Ivrea, and Pisa. The aim of the paper is to retrace some steps of the
CEP project, carried out by the University of Pisa in collaboration with
Olivetti, by reassessing... | cs.* |
More than hundred years ago the 'classic physics' was it in its full power,
with just a few unexplained phenomena; which however led to a revolution and
the development of the 'modern physics'. Today the computing is in a similar
position: computing is a sound success story, with exponentially growing
utilization, but ... | cs.* |
The Oprema (Optikrechenmaschine = computer for optical calculations) was a
relay computer whose development was initiated by Herbert Kortum and which was
designed and built by a team under the leadership of Wilhelm Kaemmerer at Carl
Zeiss Jena (CZJ) in 1954 and 1955. Basic experiments, design and construction
of machin... | cs.* |
Technological progress has led to powerful computers and communication
technologies that penetrate nowadays all areas of science, industry and our
private lives. As a consequence, all these areas are generating digital traces
of data amounting to big data resources. This opens unprecedented opportunities
but also chall... | cs.* |
This a biographical essay about Edsger Wybe Dijkstra. | cs.* |
Data and Science has stood out in the generation of results, whether in the
projects of the scientific domain or business domain. CERN Project, Scientific
Institutes, companies like Walmart, Google, Apple, among others, need data to
present their results and make predictions in the competitive data world. Data
and Scie... | cs.* |
Moore's Law has been used by semiconductor industry as predicative indicators
of the industry and it has become a self-fulfilling prophecy. Now more people
tend to agree that the original Moore's Law started to falter. This paper
proposes a possible quantitative modification to Moore's Law. It can cover
other derivativ... | cs.* |
If Turing's groundbreaking paper in 1936 laid the foundation of the theory of
computation (ToC), it is no exaggeration to say that Cook's paper in 1971, "The
complexity of theorem proving procedures", [4] has pioneered the study of
computational complexity. So computational complexity, as an independent
research field,... | cs.* |
In June 1965, Sister Mary Kenneth Keller, BVM, received the first US PhD in
Computer Science, and this paper outlines her life and accomplishments. As a
scholar, she has the distinction of being an early advocate of
learning-by-example in artificial intelligence. Her main scholarly contribution
was in shaping computer ... | cs.* |
The most pressing problems in science are neither empirical nor theoretical,
but infrastructural. Scientific practice is defined by coproductive, mutually
reinforcing infrastructural deficits and incentive systems that everywhere
constrain and contort our art of curiosity in service of profit and prestige.
Our infrastr... | cs.* |
In 1837, the first computer program in history was sketched by the renowned
mathematician and inventor Charles Babbage. It was a program for the Analytical
Engine. The program consists of a sequence of arithmetical operations and the
necessary variable addresses (memory locations) of the arguments and the
result, displ... | cs.* |
The development of advanced generative chat models, such as ChatGPT, has
raised questions about the potential consciousness of these tools and the
extent of their general artificial intelligence. ChatGPT consistent avoidance
of passing the test is here overcome by asking ChatGPT to apply the Turing test
to itself. This... | cs.* |
Rather than simply offering suggestions, this guideline for the methodology
chapter in computer science dissertations provides thorough insights on how to
develop a strong research methodology within the area of computer science. The
method is structured into several parts starting with an overview of research
strategi... | cs.* |
Future applications demand more performance, but technology advances have
been faltering. A promising approach to further improve computer system
performance under energy constraints is to employ hardware accelerators.
Already today, mobile systems concurrently employ multiple accelerators in what
we call accelerator-l... | cs.* |
The rise in computing hardware choices is driving a reevaluation of operating
systems. The traditional role of an operating system controlling the execution
of its own hardware is evolving toward a model whereby the controlling
processor is distinct from the compute engines that are performing most of the
computations.... | cs.* |
Current operating systems are complex systems that were designed before
today's computing environments. This makes it difficult for them to meet the
scalability, heterogeneity, availability, and security challenges in current
cloud and parallel computing environments. To address these problems, we
propose a radically n... | cs.* |
We present a scheduler that improves cluster utilization and job completion
times by packing tasks having multi-resource requirements and
inter-dependencies. While the problem is algorithmically very hard, we achieve
near-optimality on the job DAGs that appear in production clusters at a large
enterprise and in benchma... | cs.* |
Since the inception of computing, we have been reliant on CPU-powered
architectures. However, today this reliance is challenged by manufacturing
limitations (CMOS scaling), performance expectations (stalled clocks, Turing
tax), and security concerns (microarchitectural attacks). To re-imagine our
computing architecture... | cs.* |
The special theme of DCM 2009, co-located with ICALP 2009, concerned
Computational Models From Nature, with a particular emphasis on computational
models derived from physics and biology. The intention was to bring together
different approaches - in a community with a strong foundational background as
proffered by the ... | cs.* |
Data-hungry applications that require terabytes of memory have become
widespread in recent years. To meet the memory needs of these applications,
data centers are embracing tiered memory architectures with near and far memory
tiers. Precise, efficient, and timely identification of hot and cold data and
their placement ... | cs.* |
We present an approach to program reasoning which inserts between a program
and its verification conditions an additional layer, the denotation of the
program expressed in a declarative form. The program is first translated into
its denotation from which subsequently the verification conditions are
generated. However, ... | cs.* |
The well known JGEX program became open source a few years ago, but
seemingly, further development of the program can only be done without the
original authors. In our project, we are looking at whether it is possible to
continue such a large project as a newcomer without the involvement of the
original authors. Is the... | cs.* |
In recent years, the rise of deep learning and automation requirements in the
software industry has elevated Intelligent Software Engineering to new heights.
The number of approaches and applications in code understanding is growing,
with deep learning techniques being used in many of them to better capture the
informa... | cs.* |
This paper introduces Tiramisu, a polyhedral framework designed to generate
high performance code for multiple platforms including multicores, GPUs, and
distributed machines. Tiramisu introduces a scheduling language with novel
extensions to explicitly manage the complexities that arise when targeting
these systems. Th... | cs.* |
This paper presents a stream-oriented architecture for structuring cluster
applications. Clusters that run applications based on this architecture can
scale to tenths of thousands of nodes with significantly less performance loss
or reliability problems. Our architecture exploits the stream nature of the
data flow and ... | cs.* |
Aneka is a platform for deploying Clouds developing applications on top of
it. It provides a runtime environment and a set of APIs that allow developers
to build .NET applications that leverage their computation on either public or
private clouds. One of the key features of Aneka is the ability of supporting
multiple p... | cs.* |
Phishing is a form of cybercrime and a threat that allows criminals,
phishers, to deceive end users in order to steal their confidential and
sensitive information. Attackers usually attempt to manipulate the psychology
and emotions of victims. The increasing threat of phishing has made its study
worthwhile and much res... | cs.* |
We present a high-level and accessible Application Programming Interface
(API) for the solution of field equations on the Cerebras Systems Wafer-Scale
Engine (WSE) with over two orders of magnitude performance gain relative to
traditional distributed computing approaches. The domain-specific API is called
the WSE Field... | cs.* |
We introduce a just-in-time runtime program transformation strategy based on
repeated recursion unfolding. Our online program optimization generates several
versions of a recursion differentiated by the minimal number of recursive steps
covered. The base case of the recursion is ignored in our technique.
Our method i... | cs.* |
In this meta-ethnography, we explore three different angles of ethical
artificial intelligence (AI) design implementation including the philosophical
ethical viewpoint, the technical perspective, and framing through a political
lens. Our qualitative research includes a literature review that highlights the
cross-refere... | cs.* |
The paper is organized as a self-contained literate Prolog program that
implements elements of an executable finite set theory with focus on
combinatorial generation and arithmetic encodings. The complete Prolog code is
available at http://logic.csci.unt.edu/tarau/research/2008/pHFS.zip . First,
ranking and unranking f... | cs.* |
We present time-constrained automata (TCA), a model for hard real-time
computation in which agents behaviors are modeled by automata and constrained
by time intervals.
TCA actions can have multiple start time and deadlines, can be aperiodic, and
are selected dynamically following a graph, the time-constrained automat... | cs.* |
Data race conditions in multi-tasking software applications are prevented by
serializing access to shared memory resources, ensuring data consistency and
deterministic behavior. Traditionally tasks acquire and release locks to
synchronize operations on shared memory. Unfortunately, lock management can add
significant p... | cs.* |
This volume contains the papers presented at the fourth international
workshop on Testing, Analysis and Verification of Software, which was
associated with the 25th IEEE/ACM International Conference on Automated
Software Engineering (ASE 2010). The collection of papers includes research on
formal specification, model-c... | cs.* |
This work proposes a Prolog-dialect for the found and prioritised problems on
expressibility and automation. Given some given C-like program, if dynamic
memory is allocated, altered and freed on runtime, then a description of
desired dynamic memory is a heap specification. The check of calculated memory
state against a... | cs.* |
Nearly twenty years after the launch of AWS, it remains difficult for most
developers to harness the enormous potential of the cloud. In this paper we lay
out an agenda for a new generation of cloud programming research aimed at
bringing research ideas to programmers in an evolutionary fashion. Key to our
approach is a... | cs.* |
In recent years, the data science community has pursued excellence and made
significant research efforts to develop advanced analytics, focusing on solving
technical problems at the expense of organizational and socio-technical
challenges. According to previous surveys on the state of data science project
management, t... | cs.* |
End of preview. Expand in Data Studio
arXiv Abstract Label 20k
This dataset contains abstracts and primary categories from arXiv papers.
Dataset Structure
The dataset is split into two parts: train and test. Each entry contains the following fields:
text: The abstract of the arXiv paper.label: The primary category of the arXiv paper.
The dataset consists of a total of 20,000 entries, with 10,000 for training and 10,000 for testing. Each primary category includes 1,250 entries per split, making the dataset balanced across all categories.
Categories
The dataset includes the following primary categories:
- Computer Science (
cs) - Economics (
econ) - Electrical Engineering and Systems Science (
eess) - Mathematics (
math) - Physics (
physics) - Quantitative Biology (
q-bio) - Quantitative Finance (
q-fin) - Statistics (
stat)
Dataset Creation
This dataset was created by using the arxiv library to query arXiv for papers across multiple categories. We fetched the abstracts and primary categories of these papers, sorted by relevance, and organized them into the Hugging Face dataset format.
Usage
You can load the dataset using the datasets library in Python:
from datasets import load_dataset
dataset = load_dataset('Voice49/arXiv-Abstract-Label-20k')
- Downloads last month
- 28