Skip to main content

previous disabled Page of 184
and
  1. No Access

    Chapter and Conference Paper

    Balanced and Explainable Social Media Analysis for Public Health with Large Language Models

    As social media becomes increasingly popular, more and more public health activities emerge, which is worth noting for pandemic monitoring and government decision-making. Current techniques for public health a...

    Yan Jiang, Ruihong Qiu, Yi Zhang, Peng-Fei Zhang in Databases Theory and Applications (2024)

  2. No Access

    Chapter and Conference Paper

    Why Query Plans Are Different: An Automatic Detection and Inference System

    Preventing plan regression has always been a demanding task. SQL tuning advisor, e.g., index advisor, and optimizer testing tool are two common solutions. The former is proposed for database users to avoid a s...

    Hai Lan, Yuanjia Zhang, Yu Dong, Dongxu Huang in Databases Theory and Applications (2024)

  3. No Access

    Chapter and Conference Paper

    Efficient Maximum Relative Fair Clique Computation in Attributed Graphs

    Cohesive subgraph mining is a fundamental problem in attributed graph analysis. However, the existing models on attributed graphs ignore the fairness of attributes. In this paper, we propose a novel model, cal...

    Yufeng Zhang, Shiyuan Liu, Yan** Wu, Lu Qin in Databases Theory and Applications (2024)

  4. No Access

    Chapter and Conference Paper

    Discovering Densest Subgraph over Heterogeneous Information Networks

    Densest Subgraph Discovery (DSD) is a fundamental and challenging problem in the field of graph mining in recent years. The DSD aims to determine, given a graph G, the subgraph with the maximum density according ...

    Haozhe Yin, Kai Wang, Wenjie Zhang, Dong Wen in Databases Theory and Applications (2024)

  5. No Access

    Chapter and Conference Paper

    Automatic Short Answer Grading in College Mathematics Using In-Context Meta-learning: An Evaluation of the Transferability of Findings

    Mathematics teachers use open-ended (OE) problems to inspire creativity, facilitate learning by self-explanation, and encourage transfer learning. While these types of problems are pedagogically valuable, stud...

    Smalenberger Michael, Elham Sohrabi in Artificial Intelligence in Education. Post… (2024)

  6. No Access

    Chapter and Conference Paper

    Intelligent Decision Making for Tanker Air Control Conflict Deployment

    Flight conflict, as the highest level of safety in air traffic control operation, has always been the focus of air control work. The research of air traffic control conflict deployment intelligence technology ...

    Yipeng Wang, Boyu Chen, Yujian Song, Deyue Zhang in Theoretical Computer Science (2024)

  7. No Access

    Chapter and Conference Paper

    Eliminating Contextual Bias in Aspect-Based Sentiment Analysis

    Pretrained language models (LMs) have made remarkable achievements in aspect-based sentiment analysis (ABSA). However, it is discovered that these models may struggle in some particular cases (e.g., to detect ...

    Ruize An, Chen Zhang, Dawei Song in Advances in Information Retrieval (2024)

  8. No Access

    Chapter and Conference Paper

    A First Step in Using Machine Learning Methods to Enhance Interaction Analysis for Embodied Learning Environments

    Investigating children’s embodied learning in mixed-reality environments, where they collaboratively simulate scientific processes, requires analyzing complex multimodal data to interpret their learning and co...

    Joyce Fonteles, Eduardo Davalos, T. S. Ashwin in Artificial Intelligence in Education (2024)

  9. No Access

    Chapter and Conference Paper

    Nonmonotone Submodular Maximization Under Routing Constraints

    In machine learning and big data, the optimization objectives based on set-cover, entropy, diversity, influence, feature selection, etc. are commonly modeled as submodular functions. Submodular (function) maxi...

    Haotian Zhang, Rao Li, Zewei Wu, Guodong Sun in Theoretical Computer Science (2024)

  10. No Access

    Chapter and Conference Paper

    A Phrase-Level Attention Enhanced CRF for Keyphrase Extraction

    Since sequence labeling-based methods take into account the dependencies between neighbouring labels, they have been widely used for keyphrase prediction. Existing methods mainly focus on the word-level sequen...

    Shinian Li, Tao Jiang, Yuxiang Zhang in Advances in Information Retrieval (2024)

  11. No Access

    Chapter and Conference Paper

    Generalized Properties of Generalized Fuzzy Sets GFScom and Its Application

    Negative information plays an essential role in knowledge representation and commonsense inference. We further continually develop the theory of a generalized fuzzy set with contradictory, opposite and medium ...

    Shengli Zhang, **g Chen in Theoretical Computer Science (2024)

  12. No Access

    Chapter and Conference Paper

    Maximum Fairness-Aware (kr)-Core Identification in Large Graphs

    Cohesive subgraph mining is a fundamental problem in attributed graph analysis. The k-core model has been widely used in many studies to measure the cohesiveness of subgraphs. However, none of them considers the ...

    **ngyu Tan, Chengyuan Guo, **aoyang Wang, Wenjie Zhang in Databases Theory and Applications (2024)

  13. No Access

    Chapter and Conference Paper

    ChatGPT for Education Research: Exploring the Potential of Large Language Models for Qualitative Codebook Development

    In qualitative data analysis, codebooks offer a systematic framework for establishing shared interpretations of themes and patterns. While the utility of codebooks is well-established in educational research, ...

    Amanda Barany, Nidhi Nasiar, Chelsea Porter in Artificial Intelligence in Education (2024)

  14. No Access

    Chapter and Conference Paper

    RIGHT: Retrieval-Augmented Generation for Mainstream Hashtag Recommendation

    Automatic mainstream hashtag recommendation aims to accurately provide users with concise and popular topical hashtags before publication. Generally, mainstream hashtag recommendation faces challenges in the c...

    Run-Ze Fan, Yixing Fan, Jiangui Chen, Jiafeng Guo in Advances in Information Retrieval (2024)

  15. No Access

    Chapter and Conference Paper

    WebSAM-Adapter: Adapting Segment Anything Model for Web Page Segmentation

    With the advancement of internet technology, web page segmentation, which aims to divide web pages into semantically coherent units, has become increasingly crucial for web-related applications. Conventional p...

    Bowen Ren, Zefeng Qian, Yuchen Sun, Chao Gao in Advances in Information Retrieval (2024)

  16. No Access

    Chapter and Conference Paper

    IFGNN: An Individual Fairness Awareness Model for Missing Sensitive Information Graphs

    Graph neural networks (GNNs) provide an approach for analyzing complicated graph data for node, edge, and graph-level prediction tasks. However, due to societal discrimination in real-world applications, the l...

    Kejia Xu, Zeming Fei, Jianke Yu, Yu Kong in Databases Theory and Applications (2024)

  17. No Access

    Chapter and Conference Paper

    Discovering Graph Differential Dependencies

    Graph differential dependencies (GDDs) are a novel class of integrity constraints in property graphs for capturing and expressing the semantics of difference in graph data. They are more expressive, and subsume o...

    Yidi Zhang, Selasi Kwashie, Michael Bewong, Junwei Hu in Databases Theory and Applications (2024)

  18. No Access

    Chapter and Conference Paper

    Balanced Hop-Constrained Path Enumeration in Signed Directed Graphs

    Hop-constrained path enumeration, which aims to output all the paths from two distinct vertices within the given hops, is one of the fundamental tasks in graph analysis. Previous works about this problem mainl...

    Zhiyang Tang, **ghao Wang, Yan** Wu, **aoyang Wang in Databases Theory and Applications (2024)

  19. No Access

    Chapter and Conference Paper

    Construction of a Sanitizable Signature and Its Application in Blockchain

    A sanitizable signature allows the signer delegate partial signing rights to a trusted sanitizer, who can change certain fields of the original message, while the authenticity of other data in the message is s...

    Gang Di, Mingjun Liu, Pengcheng Zhang, **nyu Zhao in Blockchain Technology and Application (2024)

  20. No Access

    Chapter and Conference Paper

    Ethical AIED and AIED Ethics: Toward Synergy Between AIED Research and Ethical Frameworks

    Ethical issues matter for artificial intelligence in education (AIED). Simultaneously, there is a gap between fundamental ethical critiques of AIED research goals and research practices doing ethical good. Thi...

    Conrad Borchers, **nman Liu in Artificial Intelligence in Education. Post… (2024)

previous disabled Page of 184