[PDF][PDF] Recent Advances in Practical Data Reduction.

FN Abu-Khzam, S Lamm, M Mnich, A Noe… - Algorithms for Big …, 2022 - library.oapen.org
Over the last two decades, significant advances have been made in the design and analysis
of fixed-parameter algorithms for a wide variety of graphtheoretic problems. This has …

Recent advances in practical data reduction

F Abu-Khzam, S Lamm, M Mnich, A Noe… - arXiv preprint arXiv …, 2020 - arxiv.org
Over the last two decades, significant advances have been made in the design and analysis
of fixed-parameter algorithms for a wide variety of graph-theoretic problems. This has …

Software system comparison with semantic source code embeddings

S Karakatič, A Miloševič, T Heričko - Empirical Software Engineering, 2022 - Springer
This paper presents a novel approach for comparing software systems by calculating the
robust Hausdorff distance between semantic source code embeddings of individual software …

Vulnerability rating of source code with token embedding and combinatorial algorithms

JR Barr, P Shaw, FN Abu-Khzam… - International Journal of …, 2020 - World Scientific
We present an empirical analysis of the source code of the Fluoride Bluetooth module,
which is a part of standard Android OS distribution, by exhibiting a novel approach for …

Assessing Research Productivity and Quality Across Disciplines in the School of Arts and Sciences at the Lebanese American University

K Sayyed - SAGE Open, 2024 - journals.sagepub.com
The academic performance of faculty members, as reflected by their research productivity
and quality, is a crucial factor in determining aninstitution's reputation and ranking. However …

Long Short-Term Memory Network (LSTM) based Stock Price Prediction

A Gaurav, V Arya, KT Chui, BB Gupta, C Choi… - Proceedings of the 2023 …, 2023 - dl.acm.org
Predicting stock prices is a challenging and highly sought-after task in financial markets. In
recent years, deep learning techniques, particularly Long Short-Term Memory (LSTM) …

An improved fixed-parameter algorithm for 2-club cluster edge deletion

FN Abu-Khzam, N Makarem, M Shehab - Theoretical Computer Science, 2023 - Elsevier
A 2-club is a graph of diameter at most two. In the decision version of the 2-Club Cluster
Edge Deletion problem, an undirected graph G is given along with an integer k≥ 0 as …

Feature Selection via Independent Domination

JR Barr, FN Abu-Khzam, P Shaw - 2023 Fifth International …, 2023 - ieeexplore.ieee.org
Feature or variable selection is a fundamental problem in data analysis and statistical
modeling. Classic methods resulting in dimensionality reduction are diverse and include …

Vulnerability analysis of the android kernel

JR Barr, P Shaw, T Thatcher - arXiv preprint arXiv:2112.11214, 2021 - arxiv.org
We describe a workflow used to analyze the source code of the {\sc Android OS kernel} and
rate for a particular kind of bugginess that exposes a program to hacking. The workflow …

Joint modeling method of question intent detection and slot filling for domain-oriented question answering system

H Wang, D Yang, L Guo, X Zhang - Data Technologies and …, 2023 - emerald.com
Purpose Intent detection and slot filling are two important tasks in question comprehension
of a question answering system. This study aims to build a joint task model with some …