Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2966)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Arkansas, Fayetteville (42)
- University of Wisconsin Milwaukee (42)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2872)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- Graduate Theses and Dissertations (33)
- All Capstone Projects (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 4381 - 4410 of 6727
Full-Text Articles in Physical Sciences and Mathematics
Shortest Path Computation With No Information Leakage, Kyriakos Mouratidis, Man Lung Yiu
Shortest Path Computation With No Information Leakage, Kyriakos Mouratidis, Man Lung Yiu
Research Collection School Of Computing and Information Systems
Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client’s position and her destination may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. The only existing method for privacy-preserving shortest path computation follows the obfuscation paradigm; it prevents the LBS from inferring the source and destination of the query with a probability higher than a threshold. This implies, however, that the LBS still deduces some information (albeit not exact) about the client’s location …
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Jan Kallberg
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …
Data Mining Of Protein Databases, Christopher Assi
Data Mining Of Protein Databases, Christopher Assi
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Data mining of protein databases poses special challenges because many protein databases are non-relational whereas most data mining and machine learning algorithms assume the input data to be a relational database. Protein databases are non-relational mainly because they often contain set data types. We developed new data mining algorithms that can restructure non-relational protein databases so that they become relational and amenable for various data mining and machine learning tools. We applied the new restructuring algorithms to a pancreatic protein database. After the restructuring, we also applied two classification methods, such as decision tree and SVM classifiers and compared their …
Shortest Path Computation With No Information Leakage, Kyriakos Mouratidis, Man Lung Yiu
Shortest Path Computation With No Information Leakage, Kyriakos Mouratidis, Man Lung Yiu
Kyriakos MOURATIDIS
Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client’s position and her destination may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. The only existing method for privacy-preserving shortest path computation follows the obfuscation paradigm; it prevents the LBS from inferring the source and destination of the query with a probability higher than a threshold. This implies, however, that the LBS still deduces some information (albeit not exact) about the client’s location …
Enhancing Access Privacy Of Range Retrievals Over B+Trees, Hwee Hwa Pang, Jilian Zhang, Kyriakos Mouratidis
Enhancing Access Privacy Of Range Retrievals Over B+Trees, Hwee Hwa Pang, Jilian Zhang, Kyriakos Mouratidis
Kyriakos MOURATIDIS
Users of databases that are hosted on shared servers cannot take for granted that their queries will not be disclosed to unauthorized parties. Even if the database is encrypted, an adversary who is monitoring the I/O activity on the server may still be able to infer some information about a user query. For the particular case of a B+-tree that has its nodes encrypted, we identify properties that enable the ordering among the leaf nodes to be deduced. These properties allow us to construct adversarial algorithms to recover the B+-tree structure from the I/O traces generated by range queries. Combining …
Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang
Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang
Kyriakos MOURATIDIS
Balanced multi-way number partitioning (BMNP) seeks to split a collection of numbers into subsets with (roughly) the same cardinality and subset sum. The problem is NP-hard, and there are several exact and approximate algorithms for it. However, existing exact algorithms solve only the simpler, balanced two-way number partitioning variant, whereas the most effective approximate algorithm, BLDM, may produce widely varying subset sums. In this paper, we introduce the LRM algorithm that lowers the expected spread in subset sums to one third that of BLDM for uniformly distributed numbers and odd subset cardinalities. We also propose Meld, a novel strategy for …
Twitris+: Social Media Analytics Platform For Effective Coordination, Gary Alan Smith, Amit P. Sheth, Ashutosh Sopan Jadhav, Hemant Purohit, Lu Chen, Michael Cooney, Pavan Kapanipathi, Pramod Anantharam, Pramod Koneru, Wenbo Wang
Twitris+: Social Media Analytics Platform For Effective Coordination, Gary Alan Smith, Amit P. Sheth, Ashutosh Sopan Jadhav, Hemant Purohit, Lu Chen, Michael Cooney, Pavan Kapanipathi, Pramod Anantharam, Pramod Koneru, Wenbo Wang
Kno.e.sis Publications
Twitris+ is a Semantic Social Media analytics platform to provide technologies for analyzing large-scale social media streams across Spatio-Temporal-Thematic (STT) and People-Content-Network (PCN) dimensions. It provides holistic situational awareness from one interface and enables organizational actors to engage in well-coordinated ways for desired tasks during emergency response.
Embracing Analytics For A Better Competitive Edge, Tin Seong Kam
Embracing Analytics For A Better Competitive Edge, Tin Seong Kam
Research Collection School Of Computing and Information Systems
No abstract provided.
Feature-Based Opinion Mining And Ranking, Magdalini Eirinaki, S. Pisal, J. Singh
Feature-Based Opinion Mining And Ranking, Magdalini Eirinaki, S. Pisal, J. Singh
Magdalini Eirinaki
The proliferation of blogs and social networks presents a new set of challenges and opportunities in the way information is searched and retrieved. Even though facts still play a very important role when information is sought on a topic, opinions have become increasingly important as well. Opinions expressed in blogs and social networks are playing an important role influencing everything from the products people buy to the presidential candidate they support. Thus, there is a need for a new type of search engine which will not only retrieve facts, but will also enable the retrieval of opinions. Such a search …
Enhancing Access Privacy Of Range Retrievals Over B+Trees, Hwee Hwa Pang, Jilian Zhang, Kyriakos Mouratidis
Enhancing Access Privacy Of Range Retrievals Over B+Trees, Hwee Hwa Pang, Jilian Zhang, Kyriakos Mouratidis
Research Collection School Of Computing and Information Systems
Users of databases that are hosted on shared servers cannot take for granted that their queries will not be disclosed to unauthorized parties. Even if the database is encrypted, an adversary who is monitoring the I/O activity on the server may still be able to infer some information about a user query. For the particular case of a B+-tree that has its nodes encrypted, we identify properties that enable the ordering among the leaf nodes to be deduced. These properties allow us to construct adversarial algorithms to recover the B+-tree structure from the I/O traces generated by range queries. Combining …
Determinants In Sustaining A Local Information System In The Philippines: The Case Of The Barangay Management Information System (Bmis), Charina P. Maneja, Nancy A. Tandang, Merlyne M. Paunlagui
Determinants In Sustaining A Local Information System In The Philippines: The Case Of The Barangay Management Information System (Bmis), Charina P. Maneja, Nancy A. Tandang, Merlyne M. Paunlagui
Journal of Public Affairs and Development
Information is important for the executive and legislative functions of local officials. The study determined the institutional and individual factors that contributed in sustaining a Barangay Management Information System (BMIS). The study was done in five provinces covering 90 randomly selected continuing barangays and 68 randomly selected non-continuing barangays. Chi-square Test of Independence was used to determine factors associated with whether the barangay will continue to sustain BMIS or not. Logistic regression analysis was also performed to determine factors that may influence barangay's decision to sustain BMIS. The identified significant individual factors that influenced the barangays' decision to sustain BMIS …
The Latent Maximum Entropy Principle, Shaojun Wang, Dale Schuurmans, Yunxin Zhao
The Latent Maximum Entropy Principle, Shaojun Wang, Dale Schuurmans, Yunxin Zhao
Kno.e.sis Publications
We present an extension to Jaynes’ maximum entropy principle that incorporates latent variables. The principle of latent maximum entropy we propose is different from both Jaynes’ maximum entropy principle and maximum likelihood estimation, but can yield better estimates in the presence of hidden variables and limited training data. We first show that solving for a latent maximum entropy model poses a hard nonlinear constrained optimization problem in general. However, we then show that feasible solutions to this problem can be obtained efficiently for the special case of log-linear models---which forms the basis for an efficient approximation to the latent maximum …
Exploring The Impact Of Knowledge And Social Environment On Influenza Prevention And Transmission In Midwestern United States High School Students, William L. Romine, Tanvi Banerjee, William S. Barrow, William R. Folk
Exploring The Impact Of Knowledge And Social Environment On Influenza Prevention And Transmission In Midwestern United States High School Students, William L. Romine, Tanvi Banerjee, William S. Barrow, William R. Folk
Kno.e.sis Publications
We used data from a convenience sample of 410 Midwestern United States students from six secondary schools to develop parsimonious models for explaining and predicting precautions and illness related to influenza. Scores for knowledge and perceptions were obtained using two-parameter Item Response Theory (IRT) models. Relationships between outcome variables and predictors were verified using Pearson and Spearman correlations, and nested [student within school] fixed effects multinomial logistic regression models were specified from these using Akaike’s Information Criterion (AIC). Neural network models were then formulated as classifiers using 10-fold cross validation to predict precautions and illness. Perceived barriers against taking precautions …
What Kind Of #Communication Is Twitter? A Psycholinguistic Perspective On Communication In Twitter For The Purpose Of Emergency Coordination, Hemant Purohit, Andrew Hampton, Valerie L. Shalin, Amit P. Sheth, John Flach
What Kind Of #Communication Is Twitter? A Psycholinguistic Perspective On Communication In Twitter For The Purpose Of Emergency Coordination, Hemant Purohit, Andrew Hampton, Valerie L. Shalin, Amit P. Sheth, John Flach
Kno.e.sis Publications
The present research aims to detect coordinated citizen response within social media traffic to assist emergency response. We use domain-independent linguistic properties as the first step in narrowing the candidate set of messages for domain-dependent and computationally intensive analysis.
K-Partite Graph Reinforcement And Its Application In Multimedia Information Retrieval, Yue Gao, Meng Wang, Rongrong Ji, Zheng-Jun Zha, Jialie Shen
K-Partite Graph Reinforcement And Its Application In Multimedia Information Retrieval, Yue Gao, Meng Wang, Rongrong Ji, Zheng-Jun Zha, Jialie Shen
Research Collection School Of Computing and Information Systems
In many example-based information retrieval tasks, example query actually contains multiple sub-queries. For example, in 3D object retrieval, the query is an object described by multiple views. In content-based video retrieval, the query is a video clip that contains multiple frames. Without prior knowledge, the most intuitive approach is to treat the sub-queries equally without difference. In this paper, we propose a k-partite graph reinforcement approach to fuse these sub-queries based on the to-be-retrieved database. The approach first collects the top retrieved results. These results are regarded as pseudo-relevant samples and then a k-partite graph reinforcement is performed on these …
Information-Theoretic Multi-View Domain Adaptation, Pei Yang, Wei Gao, Qi Tan, Kam-Fai Wong
Information-Theoretic Multi-View Domain Adaptation, Pei Yang, Wei Gao, Qi Tan, Kam-Fai Wong
Research Collection School Of Computing and Information Systems
We use multiple views for cross-domain document classification. The main idea is to strengthen the views’ consistency for target data with source training data by identifying the correlations of domain-specific features from different domains. We present an Information-theoretic Multi-view Adaptation Model (IMAM) based on a multi-way clustering scheme, where word and link clusters can draw together seemingly unrelated domain-specific features from both sides and iteratively boost the consistency between document clusterings based on word and link views. Experiments show that IMAM significantly outperforms state-of-the-art baselines.
Formal Analysis Of Pervasive Computing Systems, Yan Liu, Xian Zhang, Jin Song Dong, Yang Liu, Jun Sun, Jit Biswas, Mounir Mokhtari
Formal Analysis Of Pervasive Computing Systems, Yan Liu, Xian Zhang, Jin Song Dong, Yang Liu, Jun Sun, Jit Biswas, Mounir Mokhtari
Research Collection School Of Computing and Information Systems
Pervasive computing systems are heterogenous and complex as they usually involve human activities, various sensors and actuators as well as middleware for system controlling. Therefore, analyzing such systems is highly nontrivial. In this work, we propose to use formal methods for analyzing pervasive computing systems. Firstly, a formal modeling framework is proposed to cover the main characteristics of pervasive computing systems (e.g., context-awareness, concurrent communications, layered architectures). Secondly, we identify the safety requirements (e.g., free of deadlocks and conflicts etc.) and propose their specifications as safety and liveness properties. Finally, we demonstrate our ideas using a case study of a …
Adaptive Cgf For Pilots Training In Air Combat Simulation, Teck-Hou Teng, Ah-Hwee Tan, Wee-Sze Ong, Kien-Lip Lee
Adaptive Cgf For Pilots Training In Air Combat Simulation, Teck-Hou Teng, Ah-Hwee Tan, Wee-Sze Ong, Kien-Lip Lee
Research Collection School Of Computing and Information Systems
Training of combat fighter pilots is often conducted using either human opponents or non-adaptive computer-generated force (CGF) inserted with the doctrine for conducting air combat mission. The novelty and challenges of such non-adaptive doctrine-driven CGF is often lost quickly. Incorporating more complex knowledge manually is known to be tedious and time-consuming. Therefore, a study of using adaptive CGF to learn from the real-time interactions with human pilots to extend the existing doctrine is conducted in this work. The goal of this study is to show how an adaptive CGF can be more effective than a non-adaptive doctrine-driven CGF for simulator-based …
Mydeal: The Context-Aware Urban Shopping Assistant, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan
Mydeal: The Context-Aware Urban Shopping Assistant, Kartik Muralidharan, Swapna Gottipati, Jing Jiang, Narayan Ramasubbu, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
A common problem in large Urban cities, of the sort seen in Asia, is the huge number of retail options available in the city. In particular, it is not uncommon to find multiple malls, each with hundreds of stores inside, just a short distance from each other in almost every part of these cities. These factors make it incredibly hard for consumers to identify stores of interest to them in any particular mall.In response, a number of shopping assistance applications have been created for mobile phones.However, these applications mostly just allow users to know which stores are where or to …
On-Line Portfolio Selection With Moving Average Reversion, Bin Li, Steven C. H. Hoi
On-Line Portfolio Selection With Moving Average Reversion, Bin Li, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
On-line portfolio selection has attracted increasing interests in machine learning and AI communities recently. Empirical evidences show that stock's high and low prices are temporary and stock price relatives are likely to follow the mean reversion phenomenon. While the existing mean reversion strategies are shown to achieve good empirical performance on many real datasets, they often make the single-period mean reversion assumption, which is not always satisfied in some real datasets, leading to poor performance when the assumption does not hold. To overcome the limitation, this article proposes a multiple-period mean reversion, or so-called Moving Average Reversion (MAR), and a …
Online Kernel Selection: Algorithms And Evaluations, Tianbao Yang, Mehrdad Mahdavi, Rong Jin, Jinfeng Yi, Steven C. H. Hoi
Online Kernel Selection: Algorithms And Evaluations, Tianbao Yang, Mehrdad Mahdavi, Rong Jin, Jinfeng Yi, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Kernel methods have been successfully applied to many machine learning problems. Nevertheless, since the performance of kernel methods depends heavily on the type of kernels being used, identifying good kernels among a set of given kernels is important to the success of kernel methods. A straightforward approach to address this problem is cross-validation by training a separate classifier for each kernel and choosing the best kernel classifier out of them. Another approach is Multiple Kernel Learning (MKL), which aims to learn a single kernel classifier from an optimal combination of multiple kernels. However, both approaches suffer from a high computational …
Finding Bursty Topics From Microblogs, Qiming Diao, Jing Jiang, Feida Zhu, Ee Peng Lim
Finding Bursty Topics From Microblogs, Qiming Diao, Jing Jiang, Feida Zhu, Ee Peng Lim
Research Collection School Of Computing and Information Systems
Microblogs such as Twitter reflect the general public’s reactions to major events. Bursty topics from microblogs reveal what events have attracted the most online attention. Although bursty event detection from text streams has been studied before, previous work may not be suitable for microblogs because compared with other text streams such as news articles and scientific publications, microblog posts are particularly diverse and noisy. To find topics that have bursty patterns on microblogs, we propose a topic model that simultaneousy captures two observations: (1) posts published around the same time are more likely to have the same topic, and (2) …
Detecting Anomalous Twitter Users By Extreme Group Behaviors, Hanbo Dai, Ee-Peng Lim, Feida Zhu, Hwee Hwa Pang
Detecting Anomalous Twitter Users By Extreme Group Behaviors, Hanbo Dai, Ee-Peng Lim, Feida Zhu, Hwee Hwa Pang
Research Collection School Of Computing and Information Systems
Twitter has enjoyed tremendous popularity in the recent years. To help categorizing and search tweets, Twitter users assign hashtags to their tweets. Given that hashtag assignment is the primary way to semantically categorizing and search tweets, it is highly susceptible to abuse by spammers and other anomalous users [1]. Popular hashtags such as #Obama and #ladygaga could be hijacked by having them added to unrelated tweets with the intent of misleading many other users or promoting specific agenda to the users. The users performing this act are known as the hashtag hijackers. As the hijackers usually abuse common sets of …
Exact Soft Confidence-Weighted Learning, Jialei Wang, Steven C. H. Hoi
Exact Soft Confidence-Weighted Learning, Jialei Wang, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
In this paper, we propose a new Soft Confidence-Weighted (SCW) online learning scheme, which enables the conventional confidence-weighted learning method to handle non-separable cases. Unlike the previous confidence-weighted learning algorithms, the proposed soft confidence-weighted learning method enjoys all the four salient properties: (i) large margin training, (ii) confidence weighting, (iii) capability to handle non-separable data, and (iv) adaptive margin. Our experimental results show that the proposed SCW algorithms significantly outperform the original CW algorithm. When comparing with a variety of state-of-the art algorithms (including AROW, NAROW and NHERD), we found that SCW generally achieves better or at least comparable predictive …
Topic Discovery From Tweet Replies, Bingtian Dai, Ee Peng Lim, Philips Kokoh Prasetyo
Topic Discovery From Tweet Replies, Bingtian Dai, Ee Peng Lim, Philips Kokoh Prasetyo
Research Collection School Of Computing and Information Systems
Twitter is a popular online social information network service which allows people to read and post messages up to 140 characters, known as “tweets”. In this paper, we focus on the tweets between pairs of individuals, i.e., the tweet replies, and propose a generative model to discover topics among groups of twitter users. Our model has then been evaluated with a tweet dataset to show its effectiveness.
Fast Bounded Online Gradient Descent Algorithms For Scalable Kernel-Based Online Learning, Peilin Zhao, Jialei Wang, Pengcheng Wu, Rong Jin, Steven C. H. Hoi
Fast Bounded Online Gradient Descent Algorithms For Scalable Kernel-Based Online Learning, Peilin Zhao, Jialei Wang, Pengcheng Wu, Rong Jin, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Kernel-based online learning has often shown state-of-the-art performance for many online learning tasks. It, however, suffers from a major shortcoming, that is, the unbounded number of support vectors, making it non-scalable and unsuitable for applications with large-scale datasets. In this work, we study the problem of bounded kernel-based online learning that aims to constrain the number of support vectors by a predefined budget. Although several algorithms have been proposed in literature, they are neither computationally efficient due to their intensive budget maintenance strategy nor effective due to the use of simple Perceptron algorithm. To overcome these limitations, we propose a …
Joint Learning For Coreference Resolution With Markov Logic, Yang Song, Jing Jiang, Xin Zhao, Sujian Li, Houfeng Wang
Joint Learning For Coreference Resolution With Markov Logic, Yang Song, Jing Jiang, Xin Zhao, Sujian Li, Houfeng Wang
Research Collection School Of Computing and Information Systems
Pairwise coreference resolution models must merge pairwise coreference decisions to generate final outputs. Traditional merging methods adopt different strategies such as the best first method and enforcing the transitivity constraint, but most of these methods are used independently of the pairwise learning methods as an isolated inference procedure at the end. We propose a joint learning model which combines pairwise classification and mention clustering with Markov logic. Experimental results show that our joint learning system outperforms independent learning systems. Our system gives a better performance than all the learning-based systems from the CoNLL-2011 shared task on the same dataset. Compared …
Identifying Event-Related Bursts Via Social Media Activities, Xin Zhao, Baihan Shu, Jing Jiang, Yang Song, Hongfei Yan, Xiaoming Li
Identifying Event-Related Bursts Via Social Media Activities, Xin Zhao, Baihan Shu, Jing Jiang, Yang Song, Hongfei Yan, Xiaoming Li
Research Collection School Of Computing and Information Systems
Activities on social media increase at a dramatic rate. When an external event happens, there is a surge in the degree of activities related to the event. These activities may be temporally correlated with one another, but they may also capture different aspects of an event and therefore exhibit different bursty patterns. In this paper, we propose to identify event-related bursts via social media activities. We study how to correlate multiple types of activities to derive a global bursty pattern. To model smoothness of one state sequence, we propose a novel function which can capture the state context. The experiments …
Iexplore: A Provenance-Based Application For Exploring Biomedical Knowledge, Vinh Nguyen, Olivier Bodenreider, Thomas Rindflesch, Amit P. Sheth
Iexplore: A Provenance-Based Application For Exploring Biomedical Knowledge, Vinh Nguyen, Olivier Bodenreider, Thomas Rindflesch, Amit P. Sheth
Kno.e.sis Publications
No abstract provided.
W3c Semantic Sensor Networks: Ontologies, Applications, And Future Directions, Cory Andrew Henson
W3c Semantic Sensor Networks: Ontologies, Applications, And Future Directions, Cory Andrew Henson
Kno.e.sis Publications
Plenary Talk discussing the W3C Semantic Sensor Network, including the ontology, applications, and future directions.