Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2960)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (100)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2866)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 361 - 390 of 6717
Full-Text Articles in Physical Sciences and Mathematics
Semantic Scene Completion With Cleaner Self, Fengyun Wang, Dong Zhang, Hanwang Zhang, Jinhui Tang, Qianru Sun
Semantic Scene Completion With Cleaner Self, Fengyun Wang, Dong Zhang, Hanwang Zhang, Jinhui Tang, Qianru Sun
Research Collection School Of Computing and Information Systems
Semantic Scene Completion (SSC) transforms an image of single-view depth and/or RGB 2D pixels into 3D voxels, each of whose semantic labels are predicted. SSC is a well-known ill-posed problem as the prediction model has to “imagine” what is behind the visible surface, which is usually represented by Truncated Signed Distance Function (TSDF). Due to the sensory imperfection of the depth camera, most existing methods based on the noisy TSDF estimated from depth values suffer from 1) incomplete volumetric predictions and 2) confused semantic labels. To this end, we use the ground-truth 3D voxels to generate a perfect visible surface, …
Unbiased Multiple Instance Learning For Weakly Supervised Video Anomaly Detection, Hui Lyu, Zhongqi Yue, Qianru Sun, Bin Luo, Zhen Cui, Hanwang Zhang
Unbiased Multiple Instance Learning For Weakly Supervised Video Anomaly Detection, Hui Lyu, Zhongqi Yue, Qianru Sun, Bin Luo, Zhen Cui, Hanwang Zhang
Research Collection School Of Computing and Information Systems
Weakly Supervised Video Anomaly Detection (WSVAD) is challenging because the binary anomaly label is only given on the video level, but the output requires snippet-level predictions. So, Multiple Instance Learning (MIL) is prevailing in WSVAD. However, MIL is notoriously known to suffer from many false alarms because the snippet-level detector is easily biased towards the abnormal snippets with simple context, confused by the normality with the same bias, and missing the anomaly with a different pattern. To this end, we propose a new MIL framework: Unbiased MIL (UMIL), to learn unbiased anomaly features that improve WSVAD. At each MIL training …
Groundnlq @ Ego4d Natural Language Queries Challenge 2023, Zhijian Hou, Lei Ji, Difei Gao, Wanjun Zhong, Kun Yan, Chong-Wah Ngo, Wing-Kwong Chan, Chong-Wah Ngo, Nan Duan, Mike Zheng Shou
Groundnlq @ Ego4d Natural Language Queries Challenge 2023, Zhijian Hou, Lei Ji, Difei Gao, Wanjun Zhong, Kun Yan, Chong-Wah Ngo, Wing-Kwong Chan, Chong-Wah Ngo, Nan Duan, Mike Zheng Shou
Research Collection School Of Computing and Information Systems
In this report, we present our champion solution for Ego4D Natural Language Queries (NLQ) Challenge in CVPR 2023. Essentially, to accurately ground in a video, an effective egocentric feature extractor and a powerful grounding model are required. Motivated by this, we leverage a two-stage pre-training strategy to train egocentric feature extractors and the grounding model on video narrations, and further fine-tune the model on annotated data. In addition, we introduce a novel grounding model GroundNLQ, which employs a multi-modal multiscale grounding module for effective video and text fusion and various temporal intervals, especially for long videos. On the blind test …
Towards A Smaller Student: Capacity Dynamic Distillation For Efficient Image Retrieval, Yi Xie, Huaidong Zhang, Xuemiao Xu, Jianqing Zhu, Shengfeng He
Towards A Smaller Student: Capacity Dynamic Distillation For Efficient Image Retrieval, Yi Xie, Huaidong Zhang, Xuemiao Xu, Jianqing Zhu, Shengfeng He
Research Collection School Of Computing and Information Systems
Previous Knowledge Distillation based efficient image retrieval methods employ a lightweight network as the student model for fast inference. However, the lightweight student model lacks adequate representation capacity for effective knowledge imitation during the most critical early training period, causing final performance degeneration. To tackle this issue, we propose a Capacity Dynamic Distillation framework, which constructs a student model with editable representation capacity. Specifically, the employed student model is initially a heavy model to fruitfully learn distilled knowledge in the early training epochs, and the student model is gradually compressed during the training. To dynamically adjust the model capacity, our …
Preference-Aware Delivery Planning For Last-Mile Logistics, Qian Shao, Shih-Fen Cheng
Preference-Aware Delivery Planning For Last-Mile Logistics, Qian Shao, Shih-Fen Cheng
Research Collection School Of Computing and Information Systems
Optimizing delivery routes for last-mile logistics service is challenging and has attracted the attention of many researchers. These problems are usually modeled and solved as variants of vehicle routing problems (VRPs) with challenging real-world constraints (e.g., time windows, precedence). However, despite many decades of solid research on solving these VRP instances, we still see significant gaps between optimized routes and the routes that are actually preferred by the practitioners. Most of these gaps are due to the difference between what's being optimized, and what the practitioners actually care about, which is hard to be defined exactly in many instances. In …
Avoiding Starvation Of Arms In Restless Multi-Armed Bandit, Dexun Li, Pradeep Varakantham
Avoiding Starvation Of Arms In Restless Multi-Armed Bandit, Dexun Li, Pradeep Varakantham
Research Collection School Of Computing and Information Systems
Restless multi-armed bandits (RMAB) is a popular framework for optimizing performance with limited resources under uncertainty. It is an extremely useful model for monitoring beneficiaries (arms) and executing timely interventions using health workers (limited resources) to ensure optimal benefit in public health settings. For instance, RMAB has been used to track patients' health and monitor their adherence in tuberculosis settings, ensure pregnant mothers listen to automated calls about good pregnancy practices, etc. Due to the limited resources, typically certain individuals, communities, or regions are starved of interventions, which can potentially have a significant negative impact on the individual/community in the …
Enhancing Third-Party Software Reliability Through Bug Bounty Programs, Tianlu Zhou, Dan Ma, Nan Feng
Enhancing Third-Party Software Reliability Through Bug Bounty Programs, Tianlu Zhou, Dan Ma, Nan Feng
Research Collection School Of Computing and Information Systems
Bug Bounty Programs (BBPs) reward external hackers for identifying and reporting software vulnerabilities. As the number of security issues caused by third-party applications has been significantly increased recently, many digital platforms are considering launching BBPs to help enhance the reliability of third-party software. BBPs bring benefits to the platform and vendors, meanwhile impose additional costs on them as well. As a result, the overall impact of using BBP is unclear. In this paper, we present an analytical model to examine the strategic decisions of launching and participating in a BBP for the platform and the third-party vendor, respectively. We find …
Improving Quantal Cognitive Hierarchy Model Through Iterative Population Learning, Yuhong Xu, Shih-Fen Cheng, Xinyu Chen
Improving Quantal Cognitive Hierarchy Model Through Iterative Population Learning, Yuhong Xu, Shih-Fen Cheng, Xinyu Chen
Research Collection School Of Computing and Information Systems
In this paper, we propose to enhance the state-of-the-art quantal cognitive hierarchy (QCH) model with iterative population learning (IPL) to estimate the empirical distribution of agents’ reasoning levels and fit human agents’ behavioral data. We apply our approach to a real-world dataset from the Swedish lowest unique positive integer (LUPI) game and show that our proposed approach outperforms the theoretical Poisson Nash equilibrium predictions and the QCH approach by 49.8% and 46.6% in Wasserstein distance respectively. Our approach also allows us to explicitly measure an agent’s reasoning level distribution, which is not previously possible.
Catching The Fast Payments Trend: Optimal Designs And Leadership Strategies Of Retail Payment And Settlement Systems, Zhiling Guo, Dan Ma
Catching The Fast Payments Trend: Optimal Designs And Leadership Strategies Of Retail Payment And Settlement Systems, Zhiling Guo, Dan Ma
Research Collection School Of Computing and Information Systems
Recent financial technologies have enabled fast payments and are reshaping retail payment and settlement systems globally. We developed an analytical model to study the optimal design of a new retail payment system in terms of settlement speed and system capability under both bank and fintech firm heterogeneous participation incentives. We found that three types of payment systems emerge as equilibrium outcomes: batch retail (BR), expedited retail (ER), and real-time retail (RR) payment systems. Although the base value of the payment service positively affects both settlement speed and system capability, the expected liquidity cost negatively impacts settlement speed, and total transaction …
Towards Explaining Sequences Of Actions In Multi-Agent Deep Reinforcement Learning Models, Phyo Wai Khaing, Minghong Geng, Budhitama Subagdja, Shubham Pateria, Ah-Hwee Tan
Towards Explaining Sequences Of Actions In Multi-Agent Deep Reinforcement Learning Models, Phyo Wai Khaing, Minghong Geng, Budhitama Subagdja, Shubham Pateria, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Although Multi-agent Deep Reinforcement Learning (MADRL) has shown promising results in solving complex real-world problems, the applicability and reliability of MADRL models are often limited by a lack of understanding of their inner workings for explaining the decisions made. To address this issue, this paper proposes a novel method for explaining MADRL by generalizing the sequences of action events performed by agents into high-level abstract strategies using a spatio-temporal neural network model. Specifically, an interval-based memory retrieval procedure is developed to generalize the encoded sequences of action events over time into short sequential patterns. In addition, two abstraction algorithms are …
Knowledge Compilation For Constrained Combinatorial Action Spaces In Reinforcement Learning, Jiajing Ling, Moritz Lukas Schuler, Akshat Kumar, Pradeep Varakantham
Knowledge Compilation For Constrained Combinatorial Action Spaces In Reinforcement Learning, Jiajing Ling, Moritz Lukas Schuler, Akshat Kumar, Pradeep Varakantham
Research Collection School Of Computing and Information Systems
Action-constrained reinforcement learning (ACRL), where any action taken in a state must satisfy given constraints, has several practical applications such as resource allocation in supply-demand matching, and path planning among others. A key challenge is to enforce constraints when the action space is discrete and combinatorial. To address this, first, we assume an action is represented using propositional variables, and action constraints are represented using Boolean functions. Second, we compactly encode the set of all valid actions that satisfy action constraints using a probabilistic sentential decision diagram (PSDD), a recently proposed knowledge compilation framework. Parameters of the PSDD compactly encode …
Avoiding Starvation Of Arms In Restless Multi-Armed Bandit, Dexun Li, Pradeep Varakantham
Avoiding Starvation Of Arms In Restless Multi-Armed Bandit, Dexun Li, Pradeep Varakantham
Research Collection School Of Computing and Information Systems
Restless multi-armed bandits (RMAB) is a popular framework for optimizing performance with limited resources under uncertainty. It is an extremely useful model for monitoring beneficiaries (arms) and executing timely interventions using health workers (limited resources) to ensure optimal benefit in public health settings. For instance, RMAB has been used to track patients’ health and monitor their adherence in tuberculosis settings, ensure pregnant mothers listen to automated calls about good pregnancy practices, etc. Due to the limited resources, typically certain individuals, communities, or regions are starved of interventions, which can potentially have a significant negative impact on the individual/community in the …
Motif Graph Neural Network, Xuexin Chen, Ruicui Cai, Yuan Fang, Min Wu, Zijian Li, Zhifeng Hao
Motif Graph Neural Network, Xuexin Chen, Ruicui Cai, Yuan Fang, Min Wu, Zijian Li, Zhifeng Hao
Research Collection School Of Computing and Information Systems
Graphs can model complicated interactions between entities, which naturally emerge in many important applications. These applications can often be cast into standard graph learning tasks, in which a crucial step is to learn low-dimensional graph representations. Graph neural networks (GNNs) are currently the most popular model in graph embedding approaches. However, standard GNNs in the neighborhood aggregation paradigm suffer from limited discriminative power in distinguishing high-order graph structures as opposed to low-order structures. To capture high-order structures, researchers have resorted to motifs and developed motif-based GNNs. However, the existing motif-based GNNs still often suffer from less discriminative power on high-order …
Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi
Efficient Convoy Routing And Bridge Load Optimization User Interface, Brandon Lacy, Will Heller, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi
Building Explainable Machine Learning Lifecycle: Model Training, Selection, And Deployment With Explainability, Vidit Singh, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani
Developing Architecture For A Routing System Using Bridge Data And Adversary Avoidance, Will Heller, Brian Ricks, Yonas Kassa, Brandon Lacy, Rahul Kamar Nethakani
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale
Progress In A New Visualization Strategy For Ml Models, Alex Wissing, Brian Ricks, Robin Gandhi, Yonas Kassa, Akshay Kale
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi
How To Select Simple-Yet-Accurate Model Of Bridge Maintenance?, Akshay Kale, Yonas Kassa, Brian Ricks, Robin Gandhi
Information Systems and Quantitative Analysis Faculty Proceedings & Presentations
No abstract provided.
Fair Signposting Profile, Herbert Van De Sompel, Martin Klein, Shawn Jones, Michael L. Nelson, Simeon Warner, Anusuriya Devaraju, Robert Huber, Wilko Steinhoff, Vyacheslav Tykhonov, Luc Boruta, Enno Meijers, Stian Soiland-Reyes, Mark Wilkonson
Fair Signposting Profile, Herbert Van De Sompel, Martin Klein, Shawn Jones, Michael L. Nelson, Simeon Warner, Anusuriya Devaraju, Robert Huber, Wilko Steinhoff, Vyacheslav Tykhonov, Luc Boruta, Enno Meijers, Stian Soiland-Reyes, Mark Wilkonson
Computer Science Faculty Publications
[First paragraph] This page details concrete recipes that platforms that host research outputs (e.g. data repositories, institutional repositories, publisher platforms, etc.) can follow to implement Signposting, a lightweight yet powerful approach to increase the FAIRness of scholarly objects.
Feature Selection From Clinical Surveys Using Semantic Textual Similarity, Benjamin Warner
Feature Selection From Clinical Surveys Using Semantic Textual Similarity, Benjamin Warner
McKelvey School of Engineering Theses & Dissertations
Survey data collected from human subjects can contain a high number of features while having a comparatively low quantity of examples. Machine learning models that attempt to predict outcomes from survey data under these conditions can overfit and result in poor generalizability. One remedy to this issue is feature selection, which attempts to select an optimal subset of features to learn upon. A relatively unexplored source of information in the feature selection process is the usage of textual names of features, which may be semantically indicative of which features are relevant to a target outcome. The relationships between feature names …
Cinema Trends And Viewer Preferences: An Analysis Of Movie Trends, Factors Leading To Box-Office Success, And Viewer Ratings, Brandon Crossland
Cinema Trends And Viewer Preferences: An Analysis Of Movie Trends, Factors Leading To Box-Office Success, And Viewer Ratings, Brandon Crossland
Analytics Capstones
This research paper investigates the critical factors that impact the success and profitability of feature films in the entertainment industry. The study is divided into two primary parts. The first part aims to identify trends in cinema and predict box office earnings using advanced data analytics techniques. The second part examines user reviews to determine the key factors that influence film viewership. The objective is to provide valuable insights to cinema enthusiasts, film executives, and streaming platforms, helping them make informed decisions on film production and recommendations. The methods utilized include descriptive data visualizations in Excel and Python and predictive …
An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark
An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark
Senior Honors Projects, 2020-current
This paper examines consensus attacks as they relate to blockchain networks. Consensus attacks are a significant threat to the security and integrity of blockchain networks, and understanding these attacks is crucial for developers and stakeholders. The primary contribution of the paper is to present blockchain and consensus attacks in a clear and accessible manner, with the aim of making these complex concepts easily understandable for a general audience. Using literature review, the paper identifies various methods to prevent consensus attacks, including multi-chain networks, proof-of-work consensus algorithms, and network auditing and monitoring. An analysis revealed that these methods for preventing consensus …
Understanding Data Mining And Its Relation To Information Systems, Malak Alammari
Understanding Data Mining And Its Relation To Information Systems, Malak Alammari
Publications and Research
This research project aims to enrich an Open Educational Resource (OER) textbook on Introduction to Information Systems/Technology with a focus on data mining and its relation to hardware and software components of information systems. The study will address the following research questions: (1) What is data mining? and (2) How does data relate to the hardware and software components of information systems? To answer these questions, the researcher will conduct research to ascertain the current state of data mining and its relevance in the field of information systems/technology. The results of the research will be incorporated into an existing OER …
Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii
Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii
Electronic Theses and Dissertations
This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.
Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson
Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson
Honors Theses
In the emerging digital world that we find ourselves in, it becomes apparent that data collection has become a staple of daily life, whether we like it or not. This research discussion aims to bring light to just how much one’s own digital identity is valued in the technologically-infused world of today, with distinct research and local examples to bring awareness to the ethical implications of your online presence. The paper in question examines anecdotal and research evidence of the collection of data, both through true and unjust means, as well as ethical implications of what this information truly represents. …
Areas Of Same Cardinal Direction, Periyandy Thunendran
Areas Of Same Cardinal Direction, Periyandy Thunendran
Electronic Theses and Dissertations
Cardinal directions, such as North, East, South, and West, are the foundation for qualitative spatial reasoning, a common field of GIS, Artificial Intelligence, and cognitive science. Such cardinal directions capture the relative spatial direction relation between a reference object and a target object, therefore, they are important search criteria in spatial databases. The projection-based model for such direction relations has been well investigated for point-like objects, yielding a relation algebra with strong inference power. The Direction Relation Matrix defines the simple region-to-region direction relations by approximating the reference object to a minimum bounding rectangle. Models that capture the direction between …
Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau
Rbac Attack Exposure Auditor. Tracking User Risk Exposure Per Role-Based Access Control Permissions, Adelaide Damrau
Undergraduate Honors Theses
Access control models and implementation guidelines for determining, provisioning, and de-provisioning user permissions are challenging due to the differing approaches, unique for each organization, the lack of information provided by case studies concerning the organization’s security policies, and no standard means of implementation procedures or best practices. Although there are multiple access control models, one stands out, role-based access control (RBAC). RBAC simplifies maintenance by enabling administrators to group users with similar permissions. This approach to managing user permissions supports the principle of least privilege and separation of duties, which are needed to ensure an organization maintains acceptable user access …
Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston
Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston
Master's Theses
In investigations, locating missing persons and clandestine remains are imperative. One way that first responder and police agencies can search for the remains is by using cadaver dogs as biological detectors. Cadaver dogs are typically used due to their olfactory sensitivity and ability to detect low concentrations of volatile organic compounds produced by biological remains. Cadaver dogs are typically chosen for their stamina, agility, and olfactory sensitivity. However, what is not taken into account often is the size of the animal and the expense of maintaining and training the animal. Cadaver dogs are typically large breeds that cannot fit in …
Bluetooth Low Energy Indoor Positioning System, Jackson T. Diamond, Jordan Hanson Dr
Bluetooth Low Energy Indoor Positioning System, Jackson T. Diamond, Jordan Hanson Dr
Whittier Scholars Program
Robust indoor positioning systems based on low energy bluetooth signals will service a wide range of applications. We present an example of a low energy bluetooth positioning system. First, the steps taken to locate the target with the bluetooth data will be reviewed. Next, we describe the algorithms of the set of android apps developed to utilize the bluetooth data for positioning. Similar to GPS, the algorithms use trilateration to approximate the target location by utilizing the corner devices running one of the apps. Due to the fluctuating nature of the bluetooth signal strength indicator (RSSI), we used an averaging …
Connecting The Dots For Contextual Information Retrieval, Pei-Chi Lo
Connecting The Dots For Contextual Information Retrieval, Pei-Chi Lo
Dissertations and Theses Collection (Open Access)
There are many information retrieval tasks that depend on knowledge graphs to return contextually relevant result of the query. We call them Knowledgeenriched Contextual Information Retrieval (KCIR) tasks and these tasks come in many different forms including query-based document retrieval, query answering and others. These KCIR tasks often require the input query to contextualized by additional facts from a knowledge graph, and using the context representation to perform document or knowledge graph retrieval and prediction. In this dissertation, we present a meta-framework that identifies Contextual Representation Learning (CRL) and Contextual Information Retrieval (CIR) to be the two key components in …