![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
145 Result(s)
-
Chapter and Conference Paper
How Can Graph Neural Networks Help Document Retrieval: A Case Study on CORD19 with Concept Map Generation
Graph neural networks (GNNs), as a group of powerful tools for representation learning on irregular data, have manifested superiority in various downstream tasks. With unstructured texts represented as concept...
-
Chapter and Conference Paper
Bi-granularity Adversarial Training for Non-factoid Answer Retrieval
Answer Retrieval is a task of automatically retrieving relevant answers towards a specific question. The recent studies, in this field, have witnessed the vast success of non-factoid QA methods which leverage ...
-
Chapter and Conference Paper
Building Linked Spatio-Temporal Data from Vectorized Historical Maps
Historical maps provide a rich source of information for researchers in the social and natural sciences. These maps contain detailed documentation of a wide variety of natural and human-made features and their...
-
Chapter and Conference Paper
The Attitudes of Chinese Online Users Towards Movie Piracy: A Content Analysis
Movies piracy has raised growing concerns in digital time. However, most studies on movie piracy focused on university students, paying less attention to the exploration of the comprehensive factors among onli...
-
Chapter
A Data Services Composition Approach for Continuous Query on Social Media Streams
We witness a rapid increase in the number of social media streams due to development of Web2.0, IoT and Cloud Computing technology. These sources include both traditional relational databases and streaming dat...
-
Chapter and Conference Paper
\(R^2\) -Tree: An Efficient Indexing Scheme for Server-Centric Data Center Networks
Index plays a very important role in cloud storage systems, which can support efficient querying tasks for data-intensive applications. However, most of existing indexing schemes for data centers focus on one ...
-
Chapter and Conference Paper
Community Structure Based Shortest Path Finding for Social Networks
With the rapid expansion of communication data, research about analyzing social networks has become a hotspot. Finding the shortest path (SP) in social networks can help us to investigate the potential social ...
-
Chapter and Conference Paper
QDR-Tree: An Efficient Index Scheme for Complex Spatial Keyword Query
With the popularity of mobile devices and the development of geo-positioning technology, location-based services (LBS) attract much attention and top-k spatial keyword queries become increasingly complex.It is co...
-
Chapter and Conference Paper
Rough Set Approximations in an Incomplete Information Table
We present a new method for constructing and interpreting rough set approximations in an incomplete information table in four steps. Step 1: we introduce the notion of conjunctively definable concepts in a com...
-
Chapter and Conference Paper
Conflict Analysis for Pythagorean Fuzzy Information Systems
Pythagorean fuzzy sets as generalizations of intuitionistic fuzzy sets are effective for dealing with uncertainty information, but little effort has been paid to conflict analysis of Pythagorean fuzzy informat...
-
Chapter and Conference Paper
Fractal Analysis Approaches to Granular Computing
Granular computing has emerged as one of the fastest growing information processing paradigms in computational intelligence and human-centric systems. Fractal analysis has equally gained ground in understandin...
-
Chapter and Conference Paper
Exploiting Geographical Location for Team Formation in Social Coding Sites
Social coding sites (SCSs) such as GitHub and BitBucket are collaborative platforms where developers from different background (e.g., culture, language, location, skills) form a team to contribute to a shared ...
-
Chapter and Conference Paper
PURE: A Novel Tripartite Model for Review Sentiment Analysis and Recommendation
Nowadays, more and more users like to leave online reviews. These reviews, which are based on their experiences on a set of service or products, often express different opinions and sentiments. Correlated topi...
-
Chapter and Conference Paper
Quantitative Analysis of Learning Data in a Programming Course
Online learning platform, which has taken higher education by storm, provides an opportunity to track students’ learning behaviors. The vast majority of educational data mining research has been carried out ba...
-
Chapter and Conference Paper
Boost Clickbait Detection Based on User Behavior Analysis
Article in the web is usually titled with a misleading title to attract the users click for gaining click-through rate (CTR). A clickbait title may increase click-through rate, but decrease user experience. Th...
-
Chapter and Conference Paper
Using Pull-Based Collaborative Development Model in Software Engineering Courses: A Case Study
The pull-based development model is an emerging way of contributing to distributed software projects within the Open Source Software (OSS) communities. To train students’ development skills with this modern pa...
-
Chapter and Conference Paper
Actionable Strategies in Three-Way Decisions with Rough Sets
Rough set theory uses three pair-wise disjoint regions to approximate a concept. This paper adopts actionable strategies in three-way decision with rough sets. We suggest actionable rules for transferring obje...
-
Chapter and Conference Paper
Location-Based Top-k Term Querying over Sliding Window
In part due to the proliferation of GPS-equipped mobile devices, massive svolumes of geo-tagged streaming text messages are becoming available on social media. It is of great interest to discover most frequent...
-
Chapter and Conference Paper
A Kernel-Based Approach to Develo** Adaptable and Reusable Sensor Retrieval Systems for the Web of Things
In the era of the Web of Things, a vast number of sensors and data streams are accessible to client applications as Web resources. Web Sensor Retrieval systems (WSR) help client applications to access Web-enab...
-
Chapter and Conference Paper
A Secure and Robust Covert Channel Based on Secret Sharing Scheme
Network covert channel (referred to as network steganography) is a covert communication technique that uses the redundancies of network protocols to transfer secret information. While encryption only protects ...