Skip to main content

previous disabled Page of 10
and
  1. No Access

    Chapter and Conference Paper

    Empowering Legal Citation Recommendation via Efficient Instruction-Tuning of Pre-trained Language Models

    The escalating volume of cases in legal adjudication has amplified the complexity of citing relevant regulations and authoritative cases, posing an increasing challenge for legal professionals. Current legal c...

    Jie Wang, Kanha Bansal, Ioannis Arapakis, Xuri Ge in Advances in Information Retrieval (2024)

  2. No Access

    Chapter and Conference Paper

    Enabling PII Discovery in Textual Data via Outlier Detection

    Discovering Personal Identifying Information (PII) in textual data is an important pre-processing step to enabling privacy preserving data analytics. One approach to PII discovery in textual data is to charact...

    Md. Rakibul Islam, Anne V. D. M. Kayem in Database and Expert Systems Applications (2023)

  3. No Access

    Chapter and Conference Paper

    Bookending ARFIS: The Development, Final Results, and Current State of the Academic Reading Format International Study

    The Academic Reading Format International Study (ARFIS) is the largest study conducted to date on tertiary students’ reading format preferences and behaviors

    Diane Mizrachi, Alicia M. Salaz in Information Literacy in a Post-Truth Era (2022)

  4. No Access

    Chapter and Conference Paper

    Education 4.0: Gaps Research Between School Formation and Technological Development

    Industry constantly changes following technological developments and innovation, resulting in changes in productivity, the labor market and education. As a result of this new industrial revolution, developed t...

    José S. da Motta Reis, Ana C. Ferreira Costa in 17th International Conference on Informati… (2020)

  5. No Access

    Chapter and Conference Paper

    Optimal Rating Prediction in Recommender Systems

    Recommendation systems are best choice to cope with the problem of information overload. These systems are commonly used in recent years help to match users with different items. The increasing amount of avai...

    Bilal Ahmed, Li Wang, Waqar Hussain, M. Abdul Qadoos, Zheng Tingyi in Data Science (2020)

  6. No Access

    Chapter and Conference Paper

    Position: GDPR Compliance by Construction

    New laws such as the European Union’s General Data Protection Regulation (GDPR) grant users unprecedented control over personal data stored and processed by businesses. Compliance can require expensive manual...

    Malte Schwarzkopf, Eddie Kohler in Heterogeneous Data Management, Polystores,… (2019)

  7. No Access

    Chapter and Conference Paper

    An Experimental Evaluation of BFT Protocols for Blockchains

    Byzantine Fault Tolerant (BFT) protocols have been used in blockchains due to their high performance and fast block acceptance

    Mohammad M. Jalalzai, Golden Richard III, Costas Busch in Blockchain – ICBC 2019 (2019)

  8. No Access

    Chapter and Conference Paper

    Evaluation Methods of Hierarchical Models

    In this paper, we consider the problem of evaluating the quality of hierarchical models. This task arises due to the current researchers use subjective evaluation, such as a survey to test the goodness of a hi...

    Abdulqader M. Almars, Ibrahim A. Ibrahim, **n Zhao in Advanced Data Mining and Applications (2018)

  9. No Access

    Chapter and Conference Paper

    Mixed Membership Sparse Gaussian Conditional Random Fields

    Building statistical models to explain the association between responses (output) and predictors (input) is critical in many real applications. In reality, responses may not be independent. A promising directi...

    Jie Yang, Henry C. M. Leung, S. M. Yiu in Advanced Data Mining and Applications (2017)

  10. No Access

    Chapter and Conference Paper

    Cuttle: Enabling Cross-Column Compression in Distributed Column Stores

    We observe that, in real-world distributed data warehouse systems, data columns from different sources often exhibit redundancy. Even though these systems can employ both general and column-oriented compressio...

    Hao Liu, Jiang **ao, **anjun Guo, Haoyu Tan, Qiong Luo, Lionel M. Ni in Web and Big Data (2017)

  11. No Access

    Chapter and Conference Paper

    A Kernel-Based Approach to Develo** Adaptable and Reusable Sensor Retrieval Systems for the Web of Things

    In the era of the Web of Things, a vast number of sensors and data streams are accessible to client applications as Web resources. Web Sensor Retrieval systems (WSR) help client applications to access Web-enab...

    Nguyen Khoi Tran, Quan Z. Sheng in Web Information Systems Engineering – WISE… (2017)

  12. No Access

    Chapter and Conference Paper

    An Investigation into the Use of Document Scores for Optimisation over Rank-Biased Precision

    When a Document Retrieval system receives a query, a Relevance model is used to provide a score to each document based on its relevance to the query. Relevance models have parameters that should be tuned to op...

    Sunil Randeni, Kenan M. Matawie, Laurence A. F. Park in Information Retrieval Technology (2017)

  13. No Access

    Chapter and Conference Paper

    PrivacySafer: Privacy Adaptation for HTML5 Web Applications

    Privacy protection is necessary in many applications in mobile and stationary environments. The advances in web applications with the introduction of HTML5 provide the possibility for cross-platform applicatio...

    Georgia M. Kapitsaki, Theodoros Charalambous in Web Information Systems Engineering – WISE… (2017)

  14. No Access

    Chapter and Conference Paper

    Exploring the Long Tail of Social Media Tags

    There are millions of users who tag multimedia content, generating a large vocabulary of tags. Some tags are frequent, while other tags are rarely used following a long tail distribution. For frequent tags, mo...

    Svetlana Kordumova, Jan van Gemert, Cees G. M. Snoek in MultiMedia Modeling (2016)

  15. No Access

    Chapter and Conference Paper

    Realizing Inclusive Digital Library Environments: Opportunities and Challenges

    Universal design, also known as inclusive design, envisions the design of products and services to be accessible and usable to all irrespective of their disability status, cultural background, age, etc. Librar...

    Wondwossen M. Beyene in Research and Advanced Technology for Digital Libraries (2016)

  16. No Access

    Chapter and Conference Paper

    Mining Source Code Topics Through Topic Model and Words Embedding

    Developers nowadays can leverage existing systems to build their own applications. However, a lack of documentation hinders the process of software system reuse. We examine the problem of mining topics (i.e., ...

    Wei Emma Zhang, Quan Z. Sheng, Ermyas Abebe in Advanced Data Mining and Applications (2016)

  17. No Access

    Chapter and Conference Paper

    Offline Text and Non-text Segmentation for Hand-Drawn Diagrams

    Writing and drawing are basic forms of human communication. Handwritten and hand-drawn documents are often used at initial stages of a project. For storage and later usage, handwritten documents are often conv...

    Buntita Pravalpruk, Matthew M. Dailey in PRICAI 2016: Trends in Artificial Intelligence (2016)

  18. No Access

    Chapter and Conference Paper

    On the distributive nature of adverbial quan in Mandarin Chinese

    The Chinese adverbial quan is analysed as an event predicate modifier that can force a distributive reading on a sentence by targetting a nominal that expresses a plural participant in the event, and encapsulatin...

    Lucia M. Tovena, Yan Li in Chinese Lexical Semantics (2016)

  19. Chapter and Conference Paper

    User Perceptions of a Virtual Human Over Mobile Video Chat Interactions

    We believe that virtual humans, presented over video chat services, such as Skype, and delivered using smartphones, can be an effective way to deliver innovative applications where social interactions are impo...

    Sin-Hwa Kang, Thai Phan, Mark Bolas in Human-Computer Interaction. Novel User Exp… (2016)

  20. No Access

    Chapter and Conference Paper

    Company Name Disambiguation in Tweets: A Two-Step Filtering Approach

    Using Twitter as an effective marketing tool has become a gold mine for companies interested in their online reputation. A quite significant research challenge related to the above issue is to disambiguate twe...

    M. Atif Qureshi, Arjumand Younus, Colm O’Riordan in Information Retrieval Technology (2015)

previous disabled Page of 10