Sciweavers

2244 search results - page 239 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
COLING
2008
15 years 2 months ago
Verification and Implementation of Language-Based Deception Indicators in Civil and Criminal Narratives
Our goal is to use natural language processing to identify deceptive and nondeceptive passages in transcribed narratives. We begin by motivating an analysis of language-based dece...
Joan Bachenko, Eileen Fitzpatrick, Michael Schonwe...
75
Voted
OOPSLA
2007
Springer
15 years 6 months ago
Understanding programmer language
The use of bad names — names that are wrong, inconsistent or inconcise — hinder program comprehension. The root of the problem is that there is no mechanism for aligning the n...
Einar W. Høst
81
Voted
ITICSE
2004
ACM
15 years 6 months ago
COMPASS: a CS program assessment project
In this paper, we describe our Computer Science Program Assessment (COMPASS) project. COMPASS uses open-source software tools to support the development and analysis of course por...
Adel M. Abunawass
143
Voted
WWW
2011
ACM
14 years 7 months ago
Domain-independent entity extraction from web search query logs
Query logs of a Web search engine have been increasingly used as a vital source for data mining. This paper presents a study on largescale domain-independent entity extraction fro...
Alpa Jain, Marco Pennacchiotti
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
15 years 7 months ago
Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning?
Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, wit...
Fu-ren Lin, Sheng-cheng Lin, Ying-fen Wang