Skip to main content

previous disabled Page of 8
and
  1. No Access

    Chapter and Conference Paper

    How Can Graph Neural Networks Help Document Retrieval: A Case Study on CORD19 with Concept Map Generation

    Graph neural networks (GNNs), as a group of powerful tools for representation learning on irregular data, have manifested superiority in various downstream tasks. With unstructured texts represented as concept...

    Hejie Cui, Jiaying Lu, Yao Ge, Carl Yang in Advances in Information Retrieval (2022)

  2. No Access

    Chapter and Conference Paper

    Bi-granularity Adversarial Training for Non-factoid Answer Retrieval

    Answer Retrieval is a task of automatically retrieving relevant answers towards a specific question. The recent studies, in this field, have witnessed the vast success of non-factoid QA methods which leverage ...

    Zhiling **, Yu Hong, Hongyu Zhu, Jianmin Yao in Advances in Information Retrieval (2022)

  3. Chapter and Conference Paper

    Building Linked Spatio-Temporal Data from Vectorized Historical Maps

    Historical maps provide a rich source of information for researchers in the social and natural sciences. These maps contain detailed documentation of a wide variety of natural and human-made features and their...

    Basel Shbita, Craig A. Knoblock, Weiwei Duan, Yao-Yi Chiang in The Semantic Web (2020)

  4. No Access

    Chapter and Conference Paper

    The Attitudes of Chinese Online Users Towards Movie Piracy: A Content Analysis

    Movies piracy has raised growing concerns in digital time. However, most studies on movie piracy focused on university students, paying less attention to the exploration of the comprehensive factors among onli...

    Yao Lyu, Juan **e, Bingbing **e in Sustainable Digital Communities (2020)

  5. No Access

    Chapter

    A Data Services Composition Approach for Continuous Query on Social Media Streams

    We witness a rapid increase in the number of social media streams due to development of Web2.0, IoT and Cloud Computing technology. These sources include both traditional relational databases and streaming dat...

    Guiling Wang, **aojiang Zuo, Marc Hesenius in Transactions on Large-Scale Data- and Know… (2019)

  6. No Access

    Chapter and Conference Paper

    \(R^2\) -Tree: An Efficient Indexing Scheme for Server-Centric Data Center Networks

    Index plays a very important role in cloud storage systems, which can support efficient querying tasks for data-intensive applications. However, most of existing indexing schemes for data centers focus on one ...

    Yin Lin, **nyi Chen, **aofeng Gao, Bin Yao in Database and Expert Systems Applications (2018)

  7. No Access

    Chapter and Conference Paper

    Community Structure Based Shortest Path Finding for Social Networks

    With the rapid expansion of communication data, research about analyzing social networks has become a hotspot. Finding the shortest path (SP) in social networks can help us to investigate the potential social ...

    Yale Chai, Chunyao Song, Peng Nie, **aojie Yuan in Database and Expert Systems Applications (2018)

  8. No Access

    Chapter and Conference Paper

    QDR-Tree: An Efficient Index Scheme for Complex Spatial Keyword Query

    With the popularity of mobile devices and the development of geo-positioning technology, location-based services (LBS) attract much attention and top-k spatial keyword queries become increasingly complex.It is co...

    **nshi Zang, Peiwen Hao, **aofeng Gao, Bin Yao in Database and Expert Systems Applications (2018)

  9. No Access

    Chapter and Conference Paper

    Rough Set Approximations in an Incomplete Information Table

    We present a new method for constructing and interpreting rough set approximations in an incomplete information table in four steps. Step 1: we introduce the notion of conjunctively definable concepts in a com...

    Mengjun J. Hu, Yiyu Y. Yao in Rough Sets (2017)

  10. No Access

    Chapter and Conference Paper

    Conflict Analysis for Pythagorean Fuzzy Information Systems

    Pythagorean fuzzy sets as generalizations of intuitionistic fuzzy sets are effective for dealing with uncertainty information, but little effort has been paid to conflict analysis of Pythagorean fuzzy informat...

    Guangming Lang, Duoqian Miao, Zhifei Zhang, Ning Yao in Rough Sets (2017)

  11. No Access

    Chapter and Conference Paper

    Fractal Analysis Approaches to Granular Computing

    Granular computing has emerged as one of the fastest growing information processing paradigms in computational intelligence and human-centric systems. Fractal analysis has equally gained ground in understandin...

    **gTao Yao, Oladunni A. Oladimeji, Yan Zhang in Rough Sets (2017)

  12. No Access

    Chapter and Conference Paper

    Exploiting Geographical Location for Team Formation in Social Coding Sites

    Social coding sites (SCSs) such as GitHub and BitBucket are collaborative platforms where developers from different background (e.g., culture, language, location, skills) form a team to contribute to a shared ...

    Yuqiang Han, Yao Wan, Liang Chen in Advances in Knowledge Discovery and Data M… (2017)

  13. No Access

    Chapter and Conference Paper

    PURE: A Novel Tripartite Model for Review Sentiment Analysis and Recommendation

    Nowadays, more and more users like to leave online reviews. These reviews, which are based on their experiences on a set of service or products, often express different opinions and sentiments. Correlated topi...

    Yue Xue, Liutong Xu, Hai Huang in Advances in Knowledge Discovery and Data Mining (2017)

  14. No Access

    Chapter and Conference Paper

    Quantitative Analysis of Learning Data in a Programming Course

    Online learning platform, which has taken higher education by storm, provides an opportunity to track students’ learning behaviors. The vast majority of educational data mining research has been carried out ba...

    Yu Bai, Liqian Chen, Gang Yin, **njun Mao in Database Systems for Advanced Applications (2017)

  15. No Access

    Chapter and Conference Paper

    Boost Clickbait Detection Based on User Behavior Analysis

    Article in the web is usually titled with a misleading title to attract the users click for gaining click-through rate (CTR). A clickbait title may increase click-through rate, but decrease user experience. Th...

    Hai-Tao Zheng, **n Yao, Yong Jiang, Shu-Tao **a, ** **ao in Web and Big Data (2017)

  16. No Access

    Chapter and Conference Paper

    Using Pull-Based Collaborative Development Model in Software Engineering Courses: A Case Study

    The pull-based development model is an emerging way of contributing to distributed software projects within the Open Source Software (OSS) communities. To train students’ development skills with this modern pa...

    Yao Lu, **njun Mao, Gang Yin, Tao Wang in Database Systems for Advanced Applications (2017)

  17. No Access

    Chapter and Conference Paper

    Actionable Strategies in Three-Way Decisions with Rough Sets

    Rough set theory uses three pair-wise disjoint regions to approximate a concept. This paper adopts actionable strategies in three-way decision with rough sets. We suggest actionable rules for transferring obje...

    Cong Gao, Yiyu Yao in Rough Sets (2017)

  18. No Access

    Chapter and Conference Paper

    Location-Based Top-k Term Querying over Sliding Window

    In part due to the proliferation of GPS-equipped mobile devices, massive svolumes of geo-tagged streaming text messages are becoming available on social media. It is of great interest to discover most frequent...

    Ying Xu, Lisi Chen, Bin Yao, Shuo Shang in Web Information Systems Engineering – WISE… (2017)

  19. No Access

    Chapter and Conference Paper

    A Kernel-Based Approach to Develo** Adaptable and Reusable Sensor Retrieval Systems for the Web of Things

    In the era of the Web of Things, a vast number of sensors and data streams are accessible to client applications as Web resources. Web Sensor Retrieval systems (WSR) help client applications to access Web-enab...

    Nguyen Khoi Tran, Quan Z. Sheng in Web Information Systems Engineering – WISE… (2017)

  20. No Access

    Chapter and Conference Paper

    A Secure and Robust Covert Channel Based on Secret Sharing Scheme

    Network covert channel (referred to as network steganography) is a covert communication technique that uses the redundancies of network protocols to transfer secret information. While encryption only protects ...

    **aorong Lu, Yang Wang, Liusheng Huang, Wei Yang in Web Technologies and Applications (2016)

previous disabled Page of 8