Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Exploiting lexical and semantic relationships in large unstructured text collections can significantly enhance managing, integrating, and querying information locked in unstructur...
This paper describes our novel retrieval model that is based on contexts of query terms in documents (i.e., document contexts). Our model is novel because it explicitly takes into...
Ho Chung Wu, Robert W. P. Luk, Kam-Fai Wong, K. L....
A variety of information extraction techniques rely on the fact that instances of the same relation are "distributionally similar," in that they tend to appear in simila...
to appear in Proc. IEEE International Conference on Computer Vision (ICCV), 2005 Bayesian methods have been extensively used in various applications. However, there are two intrin...
Yunqiang Chen, Hongcheng Wang, Tong Fang, Jason Ty...