CS Store Search
Displaying 1-5 out of 5 total
Mining Knowledge Sharing Processes in Online Discussion Forums
2014 47th Hawaii International Conference on System Sciences (HICSS)
By G. Alan Wang,Harry Jiannan Wang,Jiexun Li,Weiguo Fan
Issue Date:January 2014
Online discussion forums have become a popular knowledge source for sharing information or solving problems. This study is an attempt to apply business process modeling and mining techniques to analyzing online knowledge sharing activities. Traditional pro...
By Krishna P.C. Madhavan,Mihaela Vorvoreanu,Niklas Elmqvist,Aditya Johri,Naren Ramakrishnan,G. Alan Wang,Ann McKenna
Issue Date:October 2012
Portfolio mining facilitates the creation of actionable knowledge, catalyzes innovations, and sustains research communities.
Using Social Contextual Information to Match Criminal Identities
Hawaii International Conference on System Sciences
By G. Alan Wang, Jennifer J. Xu, Hsinchun Chen
Issue Date:January 2006
Criminal identity matching is crucial to crime investigation in law enforcement agencies. Existing techniques match identities that refer to the same individuals based on simple identity features. These techniques are subject to several problems. First, th...
Utilizing topic modeling techniques to identify the emergence and growth of research topics in engineering education
Frontiers in Education, Annual
By Aditya Johri,G. Alan Wang,Xiaomo Liu,Krishna Madhavan
Issue Date:October 2011
In this paper we present findings from a project that used topic modeling and associated techniques to chart the emergence and growth of research topics in engineering education research over 9 years, from 2000 -- 2008. As a field engineering education res...
A probabilistic model for approximate identity matching
Found in: Proceedings of the 2006 national conference on Digital government research (dg.o '06)
By G. Alan Wang, Homa Atabakhsh, Hsinchun Chen
Issue Date:May 2006
Identity management is critical to various governmental practices ranging from providing citizens services to enforcing homeland security. The task of searching for a specific identity is difficult because multiple identity representations may exist due to...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.