Sciweavers

ISI
2008
Springer
13 years 4 months ago
Using "Cited by" Information to Find the Context of Research Papers
This paper proposes a novel method of analyzing data to find important information about the context of research papers. The proposed CCTVA (Collecting, Cleaning, Translating, Visu...
Chun-Hung Lu, Chih-Chien Wang, Min-Yuh Day, Chorng...
ISI
2008
Springer
13 years 4 months ago
A template alignment algorithm for question classification
Question classification (QC) plays a key role in automated question answering (QA) systems. In Chinese QC, for example, a question is analyzed and then labeled with the question ty...
Cheng-Lung Sung, Min-Yuh Day, Hsu-Chun Yen, Wen-Li...
ISI
2008
Springer
13 years 4 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen
ISI
2008
Springer
13 years 4 months ago
Analyzing content development and visualizing social interactions in Web forum
Web forums provide platforms for any Internet users around the world to communicate with each other and express their opinions. In many of the discussions in Web Forums, it involve...
Christopher C. Yang, Tobun Dorbin Ng
ISI
2008
Springer
13 years 4 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
ISI
2008
Springer
13 years 4 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang