Building on previous work on how to model contextual information for desktop search and how to implement semantically rich information exchange in social networks, we define a new...
This paper investigates the problem of secure lossy source coding in the presence of an eavesdropper with arbitrary correlated side informations at the legitimate decoder (referre...
Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method f...
Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bha...
—This paper is concerned with investigating the factors that contribute to optimizing information transfer (IT) rate in humans. With an increasing interest in designing complex h...
Hong Z. Tan, Charlotte M. Reed, Nathaniel I. Durla...
Domain-oriented sentiment lexicons are widely used for finegrained sentiment analysis on reviews; therefore, the automatic construction of domain-oriented sentiment lexicon is a f...