Search Results

Data Mining Techniques for Predicting Breast Cancer Survivability Among Women in the United States
Poster for the 2014 UNT Graduate Exhibition in the Computer Science and Information Technology category. This poster discusses data mining techniques for predicting breast cancer survivability among women in the United States.
Identifying Leaders in an Online Cancer Survivor Community
Paper on identifying leaders in an online cancer survivor community.
Protein sequence classification using feature hashing
Article discussing protein sequence classification using feature hashing.
Global Stochastic Field Simulator
This poster was featured at the 2013 Perot Museum of Nature and Science's 'Social Science' exhibit. It discusses the Global Stochastic Field Simulator, conceived in the summer of 2011.
A Framework to Simulate and Visualize Epidemics
This poster was featured at the 2013 Perot Museum of Nature and Science's 'Social Science' exhibit. The poster discusses a framework to simulate and visualize epidemics.
Current Research in Wireless at UNT
This presentation discusses wireless networks, access point selections, traffic balancing, multi-cell CDMA, user distribution modeling, and call admission control.
Global versus Local Call Admission Control in CDMA Cellular Networks [Presentation]
This presentation discusses interference model impacts on capacity, global call admission controls, local call admission controls, and the differences in global versus local call admission controls.
WiFi and WCDMA Network Design
This presentation discusses WiFi access point selection and traffic balancing, multi-cell wideband code division multiple access (WCDMA) with multiple classes, user modeling using 2D Gaussian distribution, and intra-cell and inter-cell interference and capacity.
Energy-Aware Routing and Hybrid Synchronization in Sensor Networks
This presentation discusses the research of sensor synchronization, sensor grid routing, and voice over internet protocol (VoIP).
Self-Configuring Wireless MEMS Network
This presentation discusses miniature, lightweight, self-powered wireless sensors, and networking software needs.
Instance Based Learning with Automatic Feature Selection Applied to Word Sense Disambiguation
This paper discusses instance based learning with automatic feature selection applied to word sense disambiguation.
Letter Level Learning for Language Independent Diacritics Restoration
This paper discusses letter level learning for language independent diacritics restoration.
Building Multilingual Semantic Networks with Non-Expert Contributions over the Web
This paper discusses building multilingual semantic networks.
Protein Sequence Classification Using Feature Hashing
Article on protein sequence classification using feature hashing.
Reconfigurable Surface Plasmon Polariton Wave Adapter Designed by Transformation Optics
This article proposes a reconfigurable surface plasmon polariton (SPP) wave adapter designed by transformation optics, which can control the propagation of SPP waves on un-even surfaces.
Virtualization Based Secure Execution And Testing Framework
Article discussing the use of a virtualization software to build a Virtualization Based Secure Execution and Testing Framework for testing hardware secure architectures.
Secure Embedded Platform Networked Automotive Systems
This paper discusses secure embedded platforms for networked automotive systems.
How to Hide Secrets from Operating System: Architecture Level Support for Dynamic Address Trace Obfuscation
This technical report addresses how to hide secrets from an operating system. The authors provide a detailed design for the VM blackbox and some microarchitecture level simulation derived performance data. They also describe a compiler directed prefetch scheme that uses both instruction and data prefetches to obfuscate the address traces on the address bus between on-chip L2 cache and memory.
Efficient Energy Saving Scheme for On-Chip Caches
This paper discusses efficient energy saving techniques for on-chip caches, focusing especially on drowsy cache schemes.
Gleipnir: A Memory Analysis Tool
This paper from the International Conference on Computational Science, ICCS 2011 conference proceedings describes a program profiling and analysis tool called Gleipnir.
On the security of the Courtois-Finiasz-Sendrier signature
This article proves that a variant of the Courtois-Finiasz-Sendrier signature is strongly existentially unforgeable under chosen message attack in the random oracle model, assuming hardness of the Permuted Goppa Syndrome Decoding Problem (also known as the Niederreiter problem).
NLP (Natural Language Processing) for NLP (Natural Language Programming)
This paper discusses Natural Language Processing (NLP).
Investigations in Unsupervised Back-of-the-Book Indexing
This paper discusses investigations in unsupervised back-of-the-book indexing.
The Multidisciplinary Facets of Research on Humour
In this paper, the authors summarize the main theories of humor that emerged from philosophical and modern psychological research, and survey the past and present developments in the fields of theoretical and computational linguistics.
A Bootstrapping Method for Building Subjectivity Lexicons for Languages with Scarce Resources
This article discusses a bootstrapping method for building subjectivity lexicons for languages with scarce resources.
BABYLON Parallel Text Builder: Gathering Parallel Texts for Low-Density Languages
This paper discusses BABYLON parallel text builder.
Learning to Identify Emotions in Text
This paper discusses learning to identify emotions in text.
An Algorithm for Open Text Semantic Parsing
This paper describes an algorithm for open text shallow semantic parsing.
Making Sense Out of the Web
This paper discusses the main lines of research in deriving efficient Word Sense Disambiguation.
Putting Pieces Together: Combining FrameNet, VerbNet and WordNet for Robust Semantic Parsing
This paper describes the authors' work in integrating three different lexical resources: FrameNet, VerbNet, and WordNet, into a unified, richer knowledge-base, to the end of enabling more robust semantic parsing.
Text Semantic Similarity, with Applications
In this paper, the authors present a knowledge-based method for measuring the semantic-similarity of texts. Through experiments performed on two different applications: (1) paraphrase and entailment identification, and (2) word sense similarity, the authors show that this method outperforms the traditional text similarity metrics based on lexical matching.
Topic Identification Using Wikipedia Graph Centrality
This paper presents a method for automatic topic identification using a graph-centrality algorithm applied to an encyclopedic graph derived from Wikipedia. When tested on a data set with manually assigned topics, the system is found to significantly improve over a simpler baseline that does not make use of the external encyclopedic knowledge.
Using Encyclopedic Knowledge for Automatic Topic Identification
This paper presents a method for automatic topic identification using an encyclopedic graph derived from Wikipedia. The system is found to exceed the performance of previously proposed machine learning algorithms for topic identification, with an annotation consistency comparable to human annotations.
Channel Assignment in an IEEE 802.11 WLAN Based on Signal-to-Interference Ratio
This article discusses channel assignment in an IEEE 802.11 WLAN based on signal-to-interference ratio.
The Effect of an Enhanced Channel Assignment Algorithm on an IEEE 802.11 WLAN
This article discusses the effect of an enhanced channel assignment algorithm on an IEEE 802.11 WLAN.
Strategies for Retention and Recruitment of Women and Minorities in Computer Science and Engineering
Article discussing strategies for the retention and recruitment of women and minorities in computer science and engineering.
Optimal Access Point Selection and Traffic Allocation in IEEE 802.11 Networks
This paper discusses optimal access point selection and the traffic allocation in IEEE 802.11 networks.
Capacity Allocations in Multi-cell UMTS Networks for Different Spreading Factors with Perfect and Imperfect Power Control
This paper discusses capacity allocation in multi-cell UMTS networks.
Indoor Propagation Modeling at 2.4 GHZ for IEEE 802.11 Networks
This paper discusses indoor propagation modeling.
Intra-Class Competitive Assignments in CS2: A One-Year Study
This paper discusses intra-class competitive assignments in CS2.
Performance Enhancement by Eliminating Redundant Function Execution
This paper discusses performance enhancement by eliminating redundant function execution.
Simulation of Throughput in UMTS Networks with Different Spreading Factors
In this paper, the authors design and implement a local session admission control (SAC) algorithm for third-generation wireless networks which allows for the simulation of network throughput for different spreading factors and various mobility scenarios.
Towards a Domain Independent Semantics: Enhancing Semantic Representation with Construction Grammar
This paper shows results from an investigation whether a classifier can be taught to identify these constructions and consideration of the hypothesis that identifying construction types can improve the semantic interpretation of previously unseen predicate uses.
Classification Errors in a Domain-Independent Assessment System
This paper presents a domain-independent technique for assessing learners' constructed responses.
Detecting Sarcasm is Extremely Easy ;-)
This paper analyzes the performance of a domain-general sarcasm detection system on datasets from two different domains: Twitter and Amazon product reviews.
Secure execution environments through reconfigurable lightweight cryptographic components
This doctoral dissertation discusses secure execution environments through reconfigurable lightweight cryptographic components. The author considers the four most important dimensions of software protection.
Classifying Drug Resistance in the NCI60 Cancer Cell Lines Based on the mRNA Expression Levels of the 48 ABC Transporters
Poster for the 2014 MCBIOS Conference. This poster discusses classifying drug resistance in the NCI60 cancer cell lines based on the mRNA expression levels of the 48 ABC transporters.
Comparison of Machine Learning Algorithms for Identifying Cancer Types
Poster for the 2014 MidSouth Computational Biology and Bioinformatics Society (MCBIOS) Annual Conference. This poster discusses a comparison of machine learning algorithms for identifying cancer types.
Deep learning for peptide identification from metaproteomics datasets
This article explores a proposed deep-learning-based algorithm called DeepFilter for improving peptide identifications from a collection of tandem mass spectra. The authors find that DeepFilter is believed to generalize properly to new, previously unseen peptide-spectrum-matches and can be readily applied in peptide identification from metaproteomics data.
Nonuniform Grid-Based Coordinated Routing in Wireless Sensor Networks
This article discusses nonuniform grid-based coordinated routing in wireless sensor networks.
Back to Top of Screen