Traditional sentiment analysis mainly considers binary classifications of reviews, but in many real-world sentiment classification problems, non-binary review ratings are more useful. This is especially true when cons...
详细信息
ISBN:
(纸本)9781577355120
Traditional sentiment analysis mainly considers binary classifications of reviews, but in many real-world sentiment classification problems, non-binary review ratings are more useful. This is especially true when consumers wish to compare two products, both of which are not negative. Previous work has addressed this problem by extracting various features from the review text for learning a predictor. Since the same word may have different sentiment effects when used by different reviewers on different products, we argue that it is necessary to model such reviewer and product dependent effects in order to predict review ratings more accurately. In this paper, we propose a novel learning framework to incorporate reviewer and product information into the text based learner for rating prediction. The reviewer, product and text features are modeled as a three-dimension tensor. Tensor factorization techniques can then be employed to reduce the data sparsity problems. We perform extensive experiments to demonstrate the effectiveness of our model, which has a significant improvement compared to state of the art methods, especially for reviews with unpopular products and inactive reviewers.
In this paper we construct an atlas that captures functional characteristics of a cognitive process from a population of individuals. The functional connectivity is encoded in a low-dimensional embedding space derived...
详细信息
ISBN:
(纸本)9783642220913;9783642220920
In this paper we construct an atlas that captures functional characteristics of a cognitive process from a population of individuals. The functional connectivity is encoded in a low-dimensional embedding space derived from a diffusion process on a graph that represents correlations of fMRI time courses. The atlas is represented by a common prior distribution for the embedded fMRI signals of all subjects. The atlas is not directly coupled to the anatomical space, and can represent functional networks that are variable in their spatial distribution. We derive an algorithm for fitting this generative model to the observed data in a population. Our results in a language fMRI study demonstrate that the method identifies coherent and functionally equivalent regions across subjects.
The proceedings contain 26 papers. The special focus in this conference is on Modelling, monitoring and management of air pollution. The topics include: Information flow containment;re-designing the web’s access cont...
ISBN:
(纸本)9783642223471
The proceedings contain 26 papers. The special focus in this conference is on Modelling, monitoring and management of air pollution. The topics include: Information flow containment;re-designing the web’s access control system;integrated management of security policies;cooperative data access in multi-cloud environments;multiparty authorization framework for data sharing in online social networks;enforcing confidentiality anddata visibility constraints;public-key encrypted bloom filters with applications to supply chain integrity;an optimization model for the extended role mining problem;dynamics in delegation and revocation schemes;history-dependent inference control of queries by dynamic policy adaption;multilevel secure data stream processing;query processing in private data outsourcing using anonymization;private database search with sublinear query time;efficient distributed linear programming with limited disclosure;privacy-preserving data mining: a game-theoretic approach;enhancing cardspace authentication using a mobile device;verifiable secret sharing with comprehensive and efficient public verification;a robust remote user authentication scheme against smart card security breach;N-Gram based secure similar document detection;an index structure for private data outsourcing;selective disclosure on encrypted documents;a new leakage-resilient IBE scheme in the relative leakage model;accurate accident reconstruction in VANET;cyber situation awareness: modeling the security analyst in a cyber-attack scenario through instance-based learning;leveraging UML for security engineering and enforcement in a collaboration on duty and adaptive workflow model that extends NIST RBAC and preserving privacy in structural neuroimages.
A tool for discovery of gait anomalies of elderly from motion sensor data is proposed. The gait of the user is captured with the motion capture system, which consists of tags attached to the body and sensors situated ...
详细信息
ISBN:
(纸本)9780769542638
A tool for discovery of gait anomalies of elderly from motion sensor data is proposed. The gait of the user is captured with the motion capture system, which consists of tags attached to the body and sensors situated in the apartment. Position of the tags is acquired by the sensors and the resulting time series of position coordinates are analyzed with dynamic time warping and machine learning algorithms in order to identify the specific gait anomaly. We designed medically oriented features for training a machine learning classifier that classifies the user's gait into: i) normal, ii) with hemiplegia, iii) with Parkinson's disease, iv) with pain in the back and v) with pain in the leg. Experimental results show that the proposed tool is usable for discovery of gait anomalies.
The data mining and machine learning community is often faced with two key problems: working with imbalanced data and selecting the best features for machine learning. This paper presents a process involving a feature...
详细信息
ISBN:
(纸本)9780769542638
The data mining and machine learning community is often faced with two key problems: working with imbalanced data and selecting the best features for machine learning. This paper presents a process involving a feature selection technique for selecting the important attributes and a data sampling technique for addressing class imbalance. The application domain of this study is software engineering, more specifically, software quality prediction using classification models. When using feature selection anddata sampling together, different scenarios should be considered. The four possible scenarios are: (1) feature selection based on original data, and modeling (defect prediction) based on original data;(2) feature selection based on original data, and modeling based on sampled data;(3) feature selection based on sampled data, and modeling based on original data;and (4) feature selection based on sampled data, and modeling based on sampled data. The research objective is to compare the software defect prediction performances of models based on the four scenarios. The case study consists of nine software measurement data sets obtained from the PROMISE software project repository. Empirical results suggest that feature selection based on sampled data performs significantly better than feature selection based on original data, and that defect prediction models perform similarly regardless of whether the training data was formed using sampled or original data.
Reinforcement learning involves learning to adapt to environments through the presentation of rewards - special input - serving as clues. To obtain quick rational policies, profit sharing, rational policy making algor...
详细信息
ISBN:
(纸本)9783642153808
Reinforcement learning involves learning to adapt to environments through the presentation of rewards - special input - serving as clues. To obtain quick rational policies, profit sharing, rational policy making algorithm, penalty avoiding rational policy making algorithm (PARP), PS-r* and PS-r# are used. They are called Exploitation-oriented learning (XoL). When applying reinforcement learning to actual problems, treatment of continuous-valued input and output are sometimes required. A method based on PARP is proposed as a XoL method corresponding to the continuous-valued input, but continuous-valued output cannot be treated. We study the treatment of continuous-valued output suitable for a XoL method in which the environment includes both a reward and a penalty. We extend PARP in the continuous-valued input to continuous-valued output. We apply our proposal to the pole-cart balancing problem and confirm its validity.
Software traceability is a fundamentally important task in software engineering. The need for automated traceability increases as projects become more complex and as the number of artifacts increases. We propose an au...
详细信息
A conceptual framework for the automatic discovery of dependencies between data quality dimensions is described. Dependency discovery consists in recovering the dependency structure for a set of data quality dimension...
详细信息
ISBN:
(纸本)9783642130939
A conceptual framework for the automatic discovery of dependencies between data quality dimensions is described. Dependency discovery consists in recovering the dependency structure for a set of data quality dimensions measured on attributes of a database. This task is accomplished through the data mining methodology, by learning a Bayesian Network from a database. The Bayesian Network is used to analyze dependency between data quality dimensions associated with different attributes. The proposed framework is instantiated on a real world database. The task of dependency discovery is presented in the case when the following data quality dimensions are considered;accuracy, completeness, and consistency. The Bayesian Network model shows how data quality can be improved while satisfying budget constraints.
Development of intelligent software agents that include learning and reasoning has recently challenged the software industry. The complexity involved in the development of such systems demands a specific methodology b...
详细信息
ISBN:
(纸本)1891706268
Development of intelligent software agents that include learning and reasoning has recently challenged the software industry. The complexity involved in the development of such systems demands a specific methodology be used. To tackle this problem, this paper presents a formal approach to specification for intelligent software agents. The paper describes the different types of agents and the existing methodologies to specify those agent categories. The paper includes an analysis of intelligent software agents, capabilities, characteristics, and design issues. This paper also discusses the Descartes specification language, an executable formal method which was extended to derive the design of intelligent software agents. The extensions made to the Descartes specification language and the appropriateness towards the development of intelligent systems are also stated.
Swift changes in the regulations and the organization of the transport sector make innovation an absolute necessity. A company's ability to cope with these changes depends largely on the learning capacity of the o...
详细信息
Swift changes in the regulations and the organization of the transport sector make innovation an absolute necessity. A company's ability to cope with these changes depends largely on the learning capacity of the organization. Therefore in the transport case described in this paper the company decided that reengineering of the learning strategy was needed to handle the needs of their mobile workforce also in the long term. The strategy is based on a multi dimensional design using sound educational concepts and recent insights in the changing knowledge landscape in combination with learning 2.0 elements to handle the ever changing learning demands. The multi faceted solution is an integrated cross functional business portal with information, learning and performance improvement as the essential processes in the design. The portal is online and acceptance is clearly growing. Process monitoring and evaluation supply data on the usage and success of this integrated approach.
暂无评论