Search For:

Displaying 1-5 out of 5 total
Mining Knowledge Sharing Processes in Online Discussion Forums
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By G. Alan Wang,Harry Jiannan Wang,Jiexun Li,Weiguo Fan
Issue Date:January 2014
pp. 3898-3907
Online discussion forums have become a popular knowledge source for sharing information or solving problems. This study is an attempt to apply business process modeling and mining techniques to analyzing online knowledge sharing activities. Traditional pro...
   
Portfolio Mining
Found in: Computer
By Krishna P.C. Madhavan,Mihaela Vorvoreanu,Niklas Elmqvist,Aditya Johri,Naren Ramakrishnan,G. Alan Wang,Ann McKenna
Issue Date:October 2012
pp. 95-99
Portfolio mining facilitates the creation of actionable knowledge, catalyzes innovations, and sustains research communities.
 
Using Social Contextual Information to Match Criminal Identities
Found in: Hawaii International Conference on System Sciences
By G. Alan Wang, Jennifer J. Xu, Hsinchun Chen
Issue Date:January 2006
pp. 81b
Criminal identity matching is crucial to crime investigation in law enforcement agencies. Existing techniques match identities that refer to the same individuals based on simple identity features. These techniques are subject to several problems. First, th...
   
Utilizing topic modeling techniques to identify the emergence and growth of research topics in engineering education
Found in: Frontiers in Education, Annual
By Aditya Johri,G. Alan Wang,Xiaomo Liu,Krishna Madhavan
Issue Date:October 2011
pp. T2F-1-T2F-6
In this paper we present findings from a project that used topic modeling and associated techniques to chart the emergence and growth of research topics in engineering education research over 9 years, from 2000 -- 2008. As a field engineering education res...
 
A probabilistic model for approximate identity matching
Found in: Proceedings of the 2006 national conference on Digital government research (dg.o '06)
By G. Alan Wang, Homa Atabakhsh, Hsinchun Chen
Issue Date:May 2006
pp. 462-463
Identity management is critical to various governmental practices ranging from providing citizens services to enforcing homeland security. The task of searching for a specific identity is difficult because multiple identity representations may exist due to...
     
 1