For all these systems, despite of their domain characteristics and challenges, the core of the intelligence requires accurate interpretation and summarization of a. The ninth international conference on machine learning and applications, icmla 2010, washington, dc, usa, 1214 december 2010 ieee computer society 2010 b 4. Nico schlaefer, jennifer chucarroll, eric nyberg, james fan, wlodek zadrozny, david ferrucci. Jia wu 0005 university of electronic science and technology of china, school of information and software engineering, chengdu, china and 1 more jia wu 0006 central south university, school of information science and engineering, changsha, china. Texttoimage synthesis refers to computational methods which translate human written textual descriptions, in the form of keywords or sentences, into images with similar semantic meaning to the text. Often, additional information about the variables is known, and it is reasonable to assume that incorporating this information will lead to better predictions. Mobile users often post nearest neighbor queries based on their current location. Xingquan zhu, cross domain semisupervised learning using feature formulation, ieee transactions on systems man and cybernetics, part b, 416. We tackle the problem of matrix completion when pairwise relationships among variables are known, via a graph. We present a new keyword extraction algorithm that applies to a single document without using a corpus. Chengdu university of information technology, china. An assessment of user needs and current technology 89102 volume 3, number 2, april 1985 dblp ee. The ist journal was previous published as data processing 19821986.
Worked for the arab academy of science and technology for implementing shipment applications. It is essential to map the occurrence records to various ecological regions to understand the biodiversity patterns and make conservation plans. Yu, and chengqi zhang, oneclass learning and concept summarization for data streams knowledge and information systems, 283. He studied mathematics in luoyang, henan in china and obtained his first. He had also served as an associate editor of acm transactions on the internet technology 20002010 and knowledge and information systems 19982004. Department of computer science and technology, tsinghua. Beijing lingtu software is a computer software company based out of part 2 of 5f, dascom building, no. Web intelligence wi has been recognized as a new direction for scientific research and development to explore the fundamental roles as well as practical impacts of artificial intelligence ai e. The node set of a lengthm pattern is divided into m subgroups levels, with the ith1. An exact analysis on expected seeks in shadowed disks. Xingquan zhu, ruoming jin, yuri breitbart, gagan agrawal. For web page which are no longer available, try to retrieve content from the of the internet archive if available load content from web.
We list only scientists having hindex40 within the area of computer science and electronics. A survey and taxonomy of adversarial neural networks for. Jia wu, shirui pan, xingquan zhu, chengqi zhang, and philip s. Hao wang 0060 nanjing university of information science and technology, school of automation, department of computer and software, china. These concepts are embodied in a software model, sp61. He was the editorinchief of ieee transactions on knowledge and data engineering 20012004. He is the editorinchief of advances in information sciences, guest editor of journal of internet technology, journal of software, etc. Editorial for the special issue of knowledge discovery and management in biomedical information systems. The journal is listed on the online sciencedirect resource.
Malware detection on highly imbalanced data through. The topicperspective model for social tagging systems. Hao wang 0061 qingdao university of science and technology, college of automation and electronic engineering, china. Frequent terms are extracted first, then a set of cooccurrences between each term and the frequent terms, i. The dblp computer science bibliography provides open bibliographic information on major computer science journals and proceedings. Prior to this, he was a lecturer with the centre for artificial intelligence cai, school of software, faculty of engineering and information technology, university of technology sydneyuts. Jinhong lis research works north china university of. Hao wang 0062 xidian university, xian, shaanxi, china. Focusing on the theoretical background and advanced engineering approaches, dse aims to offer a prime forum for researchers, professionals, and industrial practitioners to share their knowledge in this rapidly. For mobile users providing location services, the privacy of mobile users is crucial. Remote sensing technology and application, 3, 1998. Malware detection on highly imbalanced data through sequence. International journal of software engineering and knowledge engineering 144.
Information retrieval challenges in computational advertising. Grain is initialized with the kbit key k and the lbit initialization value iv. Xiaodi huang institute for land, water and society. Originally created at the university of trier in 1993, dblp is now operated and further developed by schloss dagstuhl. Investigation of topic trends in computer and information science by text mining techniques.
Starting in 1993 at the university of trier, germany, it grew from a small collection of html files and became an organization hosting a database and logic programming bibliography site. Combining structured node content and topology information for networked graph. Extracting actionable knowledge from decision trees. Hirsch, dept of physics, ucsd, proposes the index h, defined as the number of papers with citation number higher or equal to h, as a useful index to characterize the scientific output of a researcher. Us8417715b1 platform independent plugin methods and. Learning graphbased poi embedding for locationbased recommendation, min xiestate key laboratory of computer science, institute of software, chinese academy of sciences, china, china, hongzhi yinthe university of queensland, school of information technology and electrical engineering, australia, hao wangstate key laboratory of. If you or other scholars are not listed, we appreciate if you can contact us. Jinhong lis 34 research works with 157 citations and 1,828 reads, including. For example, image data captured from a variety of photoready devices, such as smartphones, and online social media services opened the door to the analysis of large amounts of media datasets wla. Using tfidf to determine word relevance in document queries. Add open access links from to the list of external document links if available load links from. Daokun zhang, jie yin, xingquan zhu, chengqi zhang. Ranking for top scientists in computer science and. Software sites tucows software library shareware cdroms software capsules compilation cdrom images zx spectrum doom level cd featured image all images latest this just in flickr commons occupy wall street flickr cover art usgs maps.
Exploiting spatial context constraints for automatic image region annotation, proceedings of the fifteenth acm international conference on multimedia mm 2007, 2007, pp. A formal study of shot boundary detection, ieee transactions on circuits and systems for video technology, vol. International conference on computational science 3 2007. Ying liu, peter scheuermann, xingsen li, xingquan zhu. Lightweight distributed execution engine for large scale. Worked for a local software house in alexandria, egypt mainly for software analysis and design and implementing financial applications. Focusing on the theoretical background and advanced engineering approaches, dse aims to offer a prime forum for researchers, professionals, and industrial. This threevolume set, lnai 10937, 10938, and 10939, constitutes the thoroughly refereed proceedings of the 22nd pacificasia conference on advances in knowledge discovery and data mining, pakdd 2018, held in melbourne, vic, australia, in june 2018. Journal of convergence information technology, 2011, volume 6, issue 9, pages 210219. Department of computer science university of illinois.
The international conference on software engineering and. Read on cbr derek lin is exabeams chief data scientist and has more than 20 years of experience in the cybersecurity industry. Location privacy protection algorithm for mobile networks. When the invention is first set up andor the software installed, the configuration wizard 114 also integrates the users source systems 108 located at. Jia wu, shirui pan, xingquan zhu, chengqi zhang, philip s. Machine learning for android malware detection using permission and api calls. From the perspective of conferences in dblp su yeon kim, sung jeon song and min song 30 mar 2015 journal of the korean society for information management, vol. Keynote speaker, modeling and design with consideration of process variations, china semiconductor technology international conference cstic, march 2014.
Efficient sequential pattern mining with wildcards for. The global biodiversity information facility gbif2 has accumulated more than 500 million species occurrence records each of which is often associated with a latitude, longitude pair. A survey and taxonomy of adversarial neural networks for text. Jul 01, 2019 bibliographic content of knowledge and information systems, volume 60. Zhihao wang institute of information engineering, chinese academy of sciences, qiang li school of computer and information technology, beijing jiaotong university, jinke song school of computer and information technology, beijing jiaotong university, haining wang virginia tech and limin sun institute of information engineering, chinese. In 20 ieee 25th international conference on tools with artificial intelligence. Keynote speaker, information technology and intelligent material for water and energy conservation, tsinghua university next generation energy workshop, october 2014. In information technology industry, text analytics and summarization are now being actively applied to discover key innovations by examining articles published over past decades. Su tingxuan, raymond yiu keung lau, collective classification for social opinion spam detection, proceedings of the 2019 2nd international conference on data science and information technology, p. Publicity cochair, information and software technology montreal polytechnic, montreal, quebec, canada send an email to maleknaz nayebi. Multimedia tools and applications publishes original research articles on multimedia development and system support tools as well as case studies of multimedia applications. The worlds most comprehensive professionally edited abbreviations and acronyms database all trademarksservice marks referenced on this site are properties of their respective owners.
Assistant professor with the machine learning group, faculty of information technology, monash university. Watson research center, where he was manager of the software tools and techniques department. A fundamental challenge in many dsms applications e. Maleknaz nayebi publicity cochairs information and. International journal of information technology and decision making. Given a sequence database s e q d b s 1, s 2, s n, pattern p p 1 p 2 p m, gap constraint gn, m, the level instance graph of p is defined as a 2tuple where v is the node set, and e is the edge set. During my work there, i obtained an oracle training course. Professor jian zhang institute of software chinese academy of sciences. University of technology sydney, centre for artificial intelligence, feit. Ranking for top scientists in computer science and electronics 2018 special issues for journals with impact factor, 20172017 conference ranking. Information and software technology journal elsevier.
A probabilistic multitouch attribution model for online advertising, wendi jieast china normal university, china, xiaoling wangeast china normal university, china, dell zhangbirkbeck, university of london, united kingdom. Multimedia tools and applications is accepting new special issue proposals. Information and software technology wikimili, the free. Developed a program to convert the list of coauthors into the format of a network file which can be readable by social network analysis software. Pushing frequency constraint to utility mining model. Information and software technology is the international archival journal focusing on research and experience that contributes to the improvement of. List of publications from the dblp bibliography server faq.
Acm transactions on knowledge discovery from data, 2010, volume 5, issue 1, article 2. Xian zhang, yu hao, xiaoyan zhu, ming li, new information distance measure and its application in question answering system, journal of computer science and technology, v. Reexamining the unified theory of acceptance and use of technology utaut. Oct 21, 2019 these advances in technology allow for the extraction of several data types from a variety of sources.
Statistical source expansion for question answering. Please note that all enquiries should relate specifically to information and software technology. Ying liu, lawrence wingchi chan, chiren shyu, ying liu. Anand kumar, xingquan zhu, yicheng tu, and sagar pandit. Yu has published more than 500 papers in refereed journals and conferences. Information the result of collecting and organizing data in a way that establishes relationship between data items, which thereby provides context and meaning knowledge the concept of understanding information based on. Full text of journal of computer science ijcsis november 2015.
Streamon is the adaptive query processing engine of the stream prototype data stream management system dsms 4. Erratum to on the interplay between consistency, completeness, and correctness in requirements evolution information and software technology 45 2003 993. He was manager of the software tools and techniques group at the ibm thomas j. Mining semantic context information for intelligent video surveillance of traffic scenes t zhang, s liu, c xu, h lu ieee transactions on industrial informatics 9 1, 149 160, 20. The ninth international conference on machine learning and applications, icmla 2010, washington, dc, usa, 1214 december 2010 ieee computer society 2010 b. Pdf analysis of scihub downloads of computer science papers. The list has about 1,000 entries and in feb 2018, dblp listed 2. He is a professor in the department of computer science at the university of illinois at chicago and also holds the wexler chair in information and technology. In this paper, we propose a new probabilistic generative model, called topicperspective model, for simulating the generation process of social annotations. Jianting zhang, weiguo liu, study on software architecture of geographical information engineering. Chunlu wangs 30 research works with 84 citations and 1,546 reads, including. Jing wang, ying liu, lin zhou, yong shi, xingquan zhu.
A high utility itemset mining algorithm based on subsume index. Combining structured node content and topology information for networked graph clustering. Chunlu wangs research works beijing university of posts. A survey and taxonomy of adversarial neural networks for texttoimage synthesis. Zhabiz gharibshah, xingquan zhu, arthur hainline, and michael. The h index for computer science by jens palsberg in this paper, j. Add open access links from to the list of external document links if available. The top downloads of computer science papers were analysed, together with the geographical location of scihub users, the most downloaded publishers, types of papers downloaded, and downloads of. Usually, the mobile terminal user sends a request to query an untrusted location server, including the position information of the mobile terminal requests, thus leading to the disclosure of ones location.