C Carpineto, G Romano - Acm Computing Surveys (CSUR), 2012 - dl.acm.org
The relative ineffectiveness of information retrieval systems is largely caused by the inaccuracy with which a query formed by a few keywords models the actual user information …
CM Chen - British Journal of Educational Technology, 2009 - Wiley Online Library
Developing personalised web‐based learning systems has been an important research issue in e‐learning because no fixed learning pathway will be appropriate for all learners …
Feature vectors are extracted to represent objects in many classification tasks, such as text classification. Due to the high dimensionality of these raw feature vectors, the classification …
Z Xia, Y Zhu, X Sun, L Chen - Journal of Cloud Computing, 2014 - Springer
With the advent of cloud computing, more and more information data are outsourced to the public cloud for economic savings and ease of access. However, the privacy information has …
MA Raza, R Mokhtar, N Ahmad, M Pasha… - IEEE Access, 2019 - ieeexplore.ieee.org
Conventional approaches to query expansion (QE) rely on the integration of an unstructured corpus and probabilistic rules for the extraction of candidate expansion terms. These …
MF Sy, S Ranwez, J Montmain, A Regnault… - BMC …, 2012 - Springer
Background Because of the increasing number of electronic resources, designing efficient tools to retrieve and exploit them is a major challenge. Some improvements have been …
Q Liu, H Huang, J Xuan, G Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Top-k words selection is a technique used to detect and return the k most similar words to a given word from a candidate set. This is a crucial and widely used tool in various tasks. The …
MA Zingla, L Chiraz, Y Slimani - Procedia Computer Science, 2016 - Elsevier
Twitter has emerged as the most popular among microblogging service providers. The content provided in Twitter is large, diverse, and huge in quantity. Given the increasing …