Search For:

Displaying 1-8 out of 8 total
A General and Scalable Approach to Mixed Membership Clustering
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Frank Lin,William W. Cohen
Issue Date:December 2012
pp. 429-438
Spectral clustering methods are elegant and effective graph-based node clustering methods, but they do not allow mixed membership clustering. We describe an approach that first transforms the data from a node-centric representation to an edge-centric one, ...
Semi-Supervised Classification of Network Data Using Very Few Labels
Found in: Social Network Analysis and Mining, International Conference on Advances in
By Frank Lin, William W. Cohen
Issue Date:August 2010
pp. 192-199
The goal of semi-supervised learning (SSL) methods is to reduce the amount of labeled training data required by learning from both labeled and unlabeled instances. Macskassy and Provost (2007) proposed the weighted-vote relational neighbor classifier (wvRN...
Personalized Email Prioritization Based on Content and Social Network Analysis
Found in: IEEE Intelligent Systems
By Yiming Yang, Shinjae Yoo, Frank Lin, Il-Chul Moon
Issue Date:July 2010
pp. 12-18
<p>The proposed system combines unsupervised clustering, social network analysis, semisupervised feature induction, and supervised classification to model user priorities among incoming email messages.</p>
Exploring the Feasibility of Conducting Software Training in a Peer Learning Context with the Aid of Student-Produced Screencasts
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Tai-Yin Chi,Lorne Olfman,Frank Lin
Issue Date:January 2014
pp. 4946-4955
In this paper we explore the feasibility of conducting software training in a peer learning context with the aid of student-produced screen casts. Three case studies were conducted to collect data. Wikispaces and Screencast-O-Matic were used during softwar...
Neural Net Water Level Trend Prediction and Dynamic Water Level Sampling Frequency
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Steven P. Sweeney, Sehwan Yoo, Albert Chi, Frank Lin, Taikyeong Jeong, Sengphil Hong, Sam Fernald
Issue Date:August 2008
pp. 29-37
We have used Neural Network Water Level Trend Prediction (NNWLTP) in support of a water level sensing project. The NNWLTP approach allows dynamic change in water level sampling frequency, which will reduce power consumption and extend battery life in energ...
An Automated Framework for Validating Firewall Policy Enforcement
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li
Issue Date:June 2007
pp. 151-160
The implementation of network security devices such as firewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable and yet practical techniques for testing the functionality of firewall devices ...
A Study in Analysis and Design of Multi-agent Systems
Found in: Microelectronics Systems Education, IEEE International Conference on/Multimedia Software Engineering, International Symposium on
By Alan Liu, Frank Lin
Issue Date:November 2000
pp. 225
Applying software engineering discipline to the development of multi-agent systems (MASS) is important, because MASS are complex systems. However; not many methods are published in literature. This paper presents a study in applying a familiar object-orien...
Mining social networks for personalized email prioritization
Found in: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '09)
By Frank Lin, Il-Chul Moon, Shinjae Yoo, Yiming Yang
Issue Date:June 2009
pp. 1-24
Email is one of the most prevalent communication tools today, and solving the email overload problem is pressingly urgent. A good way to alleviate email overload is to automatically prioritize received messages according to the priorities of each user. How...