![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
182 Result(s)
-
Chapter and Conference Paper
Empowering Legal Citation Recommendation via Efficient Instruction-Tuning of Pre-trained Language Models
The escalating volume of cases in legal adjudication has amplified the complexity of citing relevant regulations and authoritative cases, posing an increasing challenge for legal professionals. Current legal c...
-
Chapter and Conference Paper
Enabling PII Discovery in Textual Data via Outlier Detection
Discovering Personal Identifying Information (PII) in textual data is an important pre-processing step to enabling privacy preserving data analytics. One approach to PII discovery in textual data is to charact...
-
Chapter and Conference Paper
Bookending ARFIS: The Development, Final Results, and Current State of the Academic Reading Format International Study
The Academic Reading Format International Study (ARFIS) is the largest study conducted to date on tertiary students’ reading format preferences and behaviors
-
Chapter and Conference Paper
Education 4.0: Gaps Research Between School Formation and Technological Development
Industry constantly changes following technological developments and innovation, resulting in changes in productivity, the labor market and education. As a result of this new industrial revolution, developed t...
-
Chapter and Conference Paper
Optimal Rating Prediction in Recommender Systems
Recommendation systems are best choice to cope with the problem of information overload. These systems are commonly used in recent years help to match users with different items. The increasing amount of avai...
-
Chapter and Conference Paper
Position: GDPR Compliance by Construction
New laws such as the European Union’s General Data Protection Regulation (GDPR) grant users unprecedented control over personal data stored and processed by businesses. Compliance can require expensive manual...
-
Chapter and Conference Paper
An Experimental Evaluation of BFT Protocols for Blockchains
Byzantine Fault Tolerant (BFT) protocols have been used in blockchains due to their high performance and fast block acceptance
-
Chapter and Conference Paper
Evaluation Methods of Hierarchical Models
In this paper, we consider the problem of evaluating the quality of hierarchical models. This task arises due to the current researchers use subjective evaluation, such as a survey to test the goodness of a hi...
-
Chapter and Conference Paper
Mixed Membership Sparse Gaussian Conditional Random Fields
Building statistical models to explain the association between responses (output) and predictors (input) is critical in many real applications. In reality, responses may not be independent. A promising directi...
-
Chapter and Conference Paper
Cuttle: Enabling Cross-Column Compression in Distributed Column Stores
We observe that, in real-world distributed data warehouse systems, data columns from different sources often exhibit redundancy. Even though these systems can employ both general and column-oriented compressio...
-
Chapter and Conference Paper
A Kernel-Based Approach to Develo** Adaptable and Reusable Sensor Retrieval Systems for the Web of Things
In the era of the Web of Things, a vast number of sensors and data streams are accessible to client applications as Web resources. Web Sensor Retrieval systems (WSR) help client applications to access Web-enab...
-
Chapter and Conference Paper
An Investigation into the Use of Document Scores for Optimisation over Rank-Biased Precision
When a Document Retrieval system receives a query, a Relevance model is used to provide a score to each document based on its relevance to the query. Relevance models have parameters that should be tuned to op...
-
Chapter and Conference Paper
PrivacySafer: Privacy Adaptation for HTML5 Web Applications
Privacy protection is necessary in many applications in mobile and stationary environments. The advances in web applications with the introduction of HTML5 provide the possibility for cross-platform applicatio...
-
Chapter and Conference Paper
Exploring the Long Tail of Social Media Tags
There are millions of users who tag multimedia content, generating a large vocabulary of tags. Some tags are frequent, while other tags are rarely used following a long tail distribution. For frequent tags, mo...
-
Chapter and Conference Paper
Realizing Inclusive Digital Library Environments: Opportunities and Challenges
Universal design, also known as inclusive design, envisions the design of products and services to be accessible and usable to all irrespective of their disability status, cultural background, age, etc. Librar...
-
Chapter and Conference Paper
Mining Source Code Topics Through Topic Model and Words Embedding
Developers nowadays can leverage existing systems to build their own applications. However, a lack of documentation hinders the process of software system reuse. We examine the problem of mining topics (i.e., ...
-
Chapter and Conference Paper
Offline Text and Non-text Segmentation for Hand-Drawn Diagrams
Writing and drawing are basic forms of human communication. Handwritten and hand-drawn documents are often used at initial stages of a project. For storage and later usage, handwritten documents are often conv...
-
Chapter and Conference Paper
On the distributive nature of adverbial quan in Mandarin Chinese
The Chinese adverbial quan is analysed as an event predicate modifier that can force a distributive reading on a sentence by targetting a nominal that expresses a plural participant in the event, and encapsulatin...
-
Chapter and Conference Paper
User Perceptions of a Virtual Human Over Mobile Video Chat Interactions
We believe that virtual humans, presented over video chat services, such as Skype, and delivered using smartphones, can be an effective way to deliver innovative applications where social interactions are impo...
-
Chapter and Conference Paper
Company Name Disambiguation in Tweets: A Two-Step Filtering Approach
Using Twitter as an effective marketing tool has become a gold mine for companies interested in their online reputation. A quite significant research challenge related to the above issue is to disambiguate twe...