: Applications such as Face Recognition (FR) that deal with high-dimensional data need a mapping technique that introduces representation of low-dimensional features with enhanced ...
This paper proposes a method to extract product features from user reviews and generate a review summary. This method only relies on product specifications, which usually are easy...
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Outlier analysis is an important task in data mining and has attracted much attention in both research and applications. Previous work on outlier detection involves different type...
Wen Jin, Yuelong Jiang, Weining Qian, Anthony K. H...
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...