Intrusion detection based on sequential information preserving log embedding methods and anomaly detection algorithms

C Kim, M Jang, S Seo, K Park, P Kang - IEEE Access, 2021 - ieeexplore.ieee.org
Previous methods for system intrusion detection have mainly consisted of those based on
pattern matching that employs prior knowledge extracted from experts' domain knowledge …

Ontology-based personalized learning path recommendation for course learning

B Cheng, Y Zhang, D Shi - 2018 9th International Conference …, 2018 - ieeexplore.ieee.org
The personalized learning path is one of the most promising personalization solutions for e-
learning. Previous work usually focuses on the learner preference which is not the most …

Empirical investigation of the efficacy and efficiency of tools for transferring software engineering knowledge

P Ardimento, D Caivano, M Cimitile… - Journal of Information & …, 2008 - World Scientific
Continuous pressure on behalf of enterprises leads to a constant need for innovation. This
involves exchanging results of knowledge and innovation among research groups and …

A spreading activation algorithm of spatial big data retrieval based on the spatial ontology model

S Sun, J Gong, J He, S Peng - Cluster Computing, 2015 - Springer
With the rapid growth of spatial data, traditional cause-effect analysis and conditional
retrieval fall short in the era of big data. Associative retrieval is more reasonable and …

Combining named entities with wordnet and using query-oriented spreading activation for semantic text search

VM Ngo, TH Cao, TMV Le - … , and Vision for the Future (RIVF), 2010 - ieeexplore.ieee.org
Purely keyword-based text search is not satisfactory because named entities and WordNet
words are also important elements to define the content of a document or a query in which …

[图书][B] Node similarities from spreading activation

K Thiel, MR Berthold - 2012 - Springer
In this paper we propose two methods to derive different kinds of node neighborhood based
similarities in a network. The first similarity measure focuses on the overlap of direct and …

Discovering latent information by spreading activation algorithm for document retrieval

VM Ngo - 2014 - researchrepository.ucd.ie
Syntactic search relies on keywords contained in a query to find suitable documents. So,
documents that do not contain the keywords but contain information related to the query are …

Measuring churner influence on pre-paid subscribers using fuzzy logic

L Columelli, M Nunez-del-Prado… - 2016 XLII Latin …, 2016 - ieeexplore.ieee.org
In the last decades, mobile phones have become the major medium for communication
between humans. The site effect is the loss of subscribers. Consequently, Telecoms …

[PDF][PDF] Caching spreading activation search

J Suchal - IIT. SRC, 2007 - Citeseer
Spreading activation search is an approach to determine similarity of graph vertices based
on energy distribution. Computation of such energy distribution is defined by a simple, but …

Entity ranking based on category expansion

J Jämsen, T Näppilä, P Arvola - Focused Access to XML Documents: 6th …, 2008 - Springer
This paper introduces category and link expansion strategies for the XML Entity Ranking
track at INEX 2007. Category expansion is a coefficient propagation method for the …