Search Results

Multi-Objective Response to Co-Resident Attacks in Cloud Environment
This article introduces a novel multi-objective attack response system.
Amazon Mechanical Turk for Subjectivity Word Sense Disambiguation
In this paper, the authors discuss research on whether they can use Mechanical Turk (MTurk) to acquire good annotations with respect to gold-standard data, whether they can filter out low-quality workers (spammers), and whether there is a learning effect associated with repeatedly completing the same kind of task.
Anchor Nodes Placement for Effective Passive Localization
This paper discusses anchor nodes placement for effective passive localization. The authors show that, for effective passive localization, the optimal placement of the anchor nodes is at the center of the network in such a way that no three anchor nodes share linearity.
Hybrid Approach for Energy-Aware Synchronization
This book chapter discusses a time synchronization scheme for wireless sensor networks that aims to save sensor battery power while maintaining network connectivity for as long as possible.
Modelling HIV Intervention among Most-at-Risk/Key Population: Case Study of FWSS in Nigeria
This article discusses a novel risk equation for estimating new infections among Females who Sell Sex (FWSS), their clients, and communities.
Towards Comprehensive Syntactic and Semantic Annotations of the Clinical Narrative
This article discusses the creation of annotated clinical narratives with layers of syntactic and semantic labels to facilitate advances in clinical natural language processing (NLP).
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies
Article (1) developing a practical framework to extract authorization attributes of hierarchical ABAC system from natural language artifacts, and (2) generating a set of realistic synthetic natural language access control policies (NLACPs) to evaluate the proposed framework.
Data Mining Techniques for Predicting Breast Cancer Survivability Among Women in the United States
Poster for the 2014 UNT Graduate Exhibition in the Computer Science and Information Technology category. This poster discusses data mining techniques for predicting breast cancer survivability among women in the United States.
Classifying Drug Resistance in the NCI60 Cancer Cell Lines Based on the mRNA Expression Levels of the 48 ABC Transporters
Poster for the 2014 MCBIOS Conference. This poster discusses classifying drug resistance in the NCI60 cancer cell lines based on the mRNA expression levels of the 48 ABC transporters.
Classifying genes to the correct Gene Ontology Slim term in Saccharomyces cerevisiae using neighbouring genes with classification learning
Article discussing research on classifying genes to the correct gene ontology slim term in Saccharomyces cerevisiae using neighbouring genes with classification learning.
Reconfigurable Surface Plasmon Polariton Wave Adapter Designed by Transformation Optics
This article proposes a reconfigurable surface plasmon polariton (SPP) wave adapter designed by transformation optics, which can control the propagation of SPP waves on un-even surfaces.
Multilingual Subjectivity: Are More Languages Better?
This paper discusses multilingual subjectivity.
Specialized Research Datasets in the CiteSeerËŸ Digital Library
This article provides an overview of some of the specialized datasets that were created for various projects related to the CiteSeerËŸ digital library.
Thread Specific Features Are Helpful For Identifying Subjectivity Orientation of Online Forum Threads
Paper discussing thread specific features for identifying subjectivity orientation of online forum threads.
Predicting Subjectivity Orientation of Online Forum Threads
This book chapter discusses predicting subjectivity orientation of online forum threads.
Identifying Emotional and Informational Support in Online Health Communities
This paper analyses user messages on an online cancer support community, Cancer Survivors Network (CSN), to identify the two types of social support present: emotional support and informational support.
Co-training over Domain-independent and Domain-dependent Features for Sentiment Analysis of an Online Cancer Support Community
Paper on co-training over domain-independent and domain-dependent features for sentiment analysis of an online cancer support community.
Automatic Generation and Scoring of Positive Interpretations from Negated Statements
This paper presents a methodology to extract positive interpretations from negated statements.
Inferring Temporally-Anchored Spatial Knowledge from Semantic Roles
This paper presents a framework to infer spatial knowledge from verbal semantic role representations.
Co-Training for Topic Classification of Scholarly Data
This paper describes a co-training approach that uses the text and citation information of a research article as two different views to predict the topic of an article.
Citation-Enhanced Keyphrase Extraction from Research Papers: A Supervised Approach
This paper proposes a supervised model for keyphrase extraction from research papers, which are embedded in citation networks.
Semi-supervised prediction of protein subcellular localization using abstraction augmented Markov models
Article discussing the semi-supervised prediction of protein subcellular localization using abstraction augmented Markov models.
Combining Hashing and Abstraction in Sparse High Dimensional Feature Spaces
Article on combining hashing and abstraction in sparse high dimensional feature spaces.
Protein Sequence Classification Using Feature Hashing
Article on protein sequence classification using feature hashing.
Abstraction Augmented Markov Models
Article discussing the abstraction augmented Markov models.
Classifying Scientific Publications Using Abstract Features
Article discussing classifying scientific publications using abstract features.
Automatic Identification of Research Articles from Crawled Documents
Paper from the Web-Scale Classification: Classifying Big Data from the Web Workshop. This paper proposes novel features that result in effective and efficient classification models for automatic identification of research articles.
Quantifying the Limits and Success of Extractive Summarization Systems Across Domains
This paper analyzes the topic identification stage of single-document automatic text summarization across four different domains, consisting of newswire, literary, scientific and legal documents.
Text and Structural Data Mining of Influenza Mentions in Web and Social Media
This article discusses text and structural data mining of influenza mentions in web and social media.
Method, System and Apparatus for Automatic Keyword Extraction
Patent relating to a method, system and apparatus for automatic keyword extraction.
Methods and Systems for Indoor Navigation
Patent relating to methods and systems for indoor navigation.
Methods for Detection of Driving Conditions and Habits
Patent relating to methods for detection of driving conditions and habits.
911 Services and Vital Sign Measurement Utilizing Mobile Phone Sensors and Applications
Patent relating to improved methods for utilizing 911 services and for implementing 911 dispatch protocols by accessing mobile phone sensors and applications.
To Annotate More Accurately or to Annotate More
This paper demonstrates that the greatest value for annotation lies in single annotating more data.
Annotating If Authors of Tweets are Located in the Locations They Tweet About
Article presented at the Eleventh International Conference on Language Resources and Evaluation (LREC 2018). The study investigates spatial information of tweets whereby the authors present a corpus of tweets annotated with temporally-anchored spatial information involving the author.
Towards Effective Tutorial Feedback for Explanation Questions: A Dataset and Baselines
This paper proposes a new shared task on grading student answers with the goal of enabling well-targeted and flexible feedback in a tutorial dialogue setting.
SemEval-2013 Task 7: The Joint Student Response Analysis and 8th Recognizing Textual Embodiment Challenge
This paper presents the results of the Joint Student Response Analysis and 8th Recognizing Textual Entailment Challenge, aiming to bring together researchers in educational NLP technology and textual entailment.
A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
This article proposes a novel encryption schema based on Elliptic Curve Cyrptography (ECC) and homomorphic encryption to secure data transmission in wireless sensor networks.
PositionRank: An Unsupervised Approach to Keyphrase Extraction from Scholarly Documents
This paper proposes PositionRank, an unsupervised model for keyphrase extraction from scholarly documents that incorporates information from all positions of a word's occurrences into a biased PageRank.
Reducing Our Carbon Footprint through Ridesharing
This report discusses research on reducing our carbon footprint through ridesharing. The focus of this research project was to analyze and collect travel trajectories to calculate carbon footprints under different travel modes and identify ways to reduce it.
Shared Ride: Transportation, Carbon Footprint and Ridesharing
This poster discusses research on transportation, carbon footprinting and ridesharing. The focus of this research project was to analyze and collect travel trajectories to calculate carbon footprints under different travel modes and identify ways to reduce it.
Automatic Generation and Classification of Minimal Meaningful Propositions in Educational Systems
This paper introduces a new representation of sentences--Minimal Meaningful Propositions (MMPS), which allows significant improvement of the mapping between a learner's answer and the ideal response.
Secure Embedded Platform Networked Automotive Systems
This paper discusses secure embedded platforms for networked automotive systems.
Bayesian analysis of complex mutations in HBV, HCV, and HIV studies
This article provides a review of the Bayesian-inference-based methods applied to Hepatitis B Virus (HBV), Hepatitis C Virus (HCV), and Human Immunodeficiency Virus (HIV) studies with a focus on the detection of the viral mutations and various problems which are correlated to these mutations. The authors also provide a summary of the Bayesian methods' applications toward these viruses' studies, where several important and useful results have been discovered.
Modeling the 2013 Zika Outbreak in French Polynesia: Intervention Strategies
Paper presents a model that simulates the 2013–2014 French Polynesia Zika outbreak, incorporating the temperature dependent mosquito ecology and the local transit network (flights and ferries), highlighting the importance of human travel patterns and mosquito population dynamics in a disease outbreak.
Towards a Domain Independent Semantics: Enhancing Semantic Representation with Construction Grammar
This paper shows results from an investigation whether a classifier can be taught to identify these constructions and consideration of the hypothesis that identifying construction types can improve the semantic interpretation of previously unseen predicate uses.
Skin Detection in Image and Video
Video from the Fall 2018 3 Minute Thesis (3MT®) Final Competition. In this video, ABM Rezbaul Islam presents his research methods, findings, and its significance in non-technical language.
Gleipnir: A Memory Analysis Tool
This paper from the International Conference on Computational Science, ICCS 2011 conference proceedings describes a program profiling and analysis tool called Gleipnir.
A Novel Space Partitioning Algorithm to Improve Current Practices in Facility Placement
This article discusses a novel space partitioning algorithm to improve current practices in facility placement.
A Performance Conserving Approach for Reducing Memory Power Consumption in Multi-Core Systems
Article proposes a strategy called Dynamic Bank Partitioning (DBP), which allocates memory banks to different applications based on their memory access characteristic, and also proposes an adaptive method to dynamically select an optimal page policy for each bank according to the characteristics of memory accesses that each bank receives to further reduce power consumption.
Back to Top of Screen