|
|
|
Ola N. Halawi, Faisal N. Abu-Khzam and Sergio Thoumi
Enormous amounts of data collected from social networks or other online platforms are being published for the sake of statistics, marketing, and research, among other objectives. The consequent privacy and data security concerns have motivated the work o...
ver más
|
|
|
|
|
|
|
Zhenping Li, Zhen Cao, Pengfei Li, Yong Zhong and Shaobo Li
The task of multi-hop question generation (QG) seeks to generate questions that require a complex reasoning process that spans multiple sentences and answers. Beyond the conventional challenges of what to ask and how to ask, multi-hop QG necessitates sop...
ver más
|
|
|
|
|
|
|
Benito Zaragozí, Sergio Trilles and Aaron Gutiérrez
The article uses passive mobile data to analyse the complex mobilities that occur in a coastal region characterised by seasonal patterns of tourism activity. A large volume of data generated by mobile phone users has been selected and processed to subseq...
ver más
|
|
|
|
|
|
|
Dong-Kyu Chae, Sung-Jun Park, Eujeanne Kim, Jiwon Hong and Sang-Wook Kim
Malware are developed for various types of malicious attacks, e.g., to gain access to a user?s private information or control of the computer system. The identification and classification of malware has been extensively studied in academic societies and ...
ver más
|
|
|
|
|
|
|
Gonçalo Carnaz, Vitor Beires Nogueira and Mário Antunes
Organizations have been challenged by the need to process an increasing amount of data, both structured and unstructured, retrieved from heterogeneous sources. Criminal investigation police are among these organizations, as they have to manually process ...
ver más
|
|
|
|
|
|
|
Austin D. Lewis and Katrina M. Groth
Dynamic Bayesian networks (DBNs) represent complex time-dependent causal relationships through the use of conditional probabilities and directed acyclic graph models. DBNs enable the forward and backward inference of system states, diagnosing current sys...
ver más
|
|
|
|
|
|
|
Borislav Slavchev, Evelina Masliankova and Steven Kelk
We present an algorithm selection framework based on machine learning for the exact computation of treewidth, an intensively studied graph parameter that is NP-hard to compute. Specifically, we analyse the comparative performance of three state-of-the-ar...
ver más
|
|
|
|
|
|
|
Laura Corlin, Shannon Ball, Mark Woodin, Allison P. Patton, Kevin Lane, John L. Durant and Doug Brugge
Emerging evidence suggests long-term exposure to ultrafine particulate matter (UFP, aerodynamic diameter < 0.1 µm) is associated with adverse cardiovascular outcomes. We investigated whether annual average UFP exposure was associated with measur...
ver más
|
|
|
|
|
|
|
Patrick Mumo Muinde,James Mwangi Karanja
Pág. 340 - 350
The profitability of commercial banks in Kenya has been a subject of intense policy debate over the past two decades. This paper explores and adduces evidence that the perceived abnormal profitability in the industry is reflected in stock returns. The st...
ver más
|
|
|
|
|
|
|
Jingsha He, Chengyue Chang, Peng He and Muhammad Salman Pathan
As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the...
ver más
|
|
|
|