[PDF][PDF] Recent Advances in Practical Data Reduction.
Over the last two decades, significant advances have been made in the design and analysis
of fixed-parameter algorithms for a wide variety of graphtheoretic problems. This has …
of fixed-parameter algorithms for a wide variety of graphtheoretic problems. This has …
Recent advances in practical data reduction
Over the last two decades, significant advances have been made in the design and analysis
of fixed-parameter algorithms for a wide variety of graph-theoretic problems. This has …
of fixed-parameter algorithms for a wide variety of graph-theoretic problems. This has …
Software system comparison with semantic source code embeddings
S Karakatič, A Miloševič, T Heričko - Empirical Software Engineering, 2022 - Springer
This paper presents a novel approach for comparing software systems by calculating the
robust Hausdorff distance between semantic source code embeddings of individual software …
robust Hausdorff distance between semantic source code embeddings of individual software …
Vulnerability rating of source code with token embedding and combinatorial algorithms
We present an empirical analysis of the source code of the Fluoride Bluetooth module,
which is a part of standard Android OS distribution, by exhibiting a novel approach for …
which is a part of standard Android OS distribution, by exhibiting a novel approach for …
Assessing Research Productivity and Quality Across Disciplines in the School of Arts and Sciences at the Lebanese American University
K Sayyed - SAGE Open, 2024 - journals.sagepub.com
The academic performance of faculty members, as reflected by their research productivity
and quality, is a crucial factor in determining aninstitution's reputation and ranking. However …
and quality, is a crucial factor in determining aninstitution's reputation and ranking. However …
Long Short-Term Memory Network (LSTM) based Stock Price Prediction
A Gaurav, V Arya, KT Chui, BB Gupta, C Choi… - Proceedings of the 2023 …, 2023 - dl.acm.org
Predicting stock prices is a challenging and highly sought-after task in financial markets. In
recent years, deep learning techniques, particularly Long Short-Term Memory (LSTM) …
recent years, deep learning techniques, particularly Long Short-Term Memory (LSTM) …
An improved fixed-parameter algorithm for 2-club cluster edge deletion
FN Abu-Khzam, N Makarem, M Shehab - Theoretical Computer Science, 2023 - Elsevier
A 2-club is a graph of diameter at most two. In the decision version of the 2-Club Cluster
Edge Deletion problem, an undirected graph G is given along with an integer k≥ 0 as …
Edge Deletion problem, an undirected graph G is given along with an integer k≥ 0 as …
Feature Selection via Independent Domination
Feature or variable selection is a fundamental problem in data analysis and statistical
modeling. Classic methods resulting in dimensionality reduction are diverse and include …
modeling. Classic methods resulting in dimensionality reduction are diverse and include …
Vulnerability analysis of the android kernel
We describe a workflow used to analyze the source code of the {\sc Android OS kernel} and
rate for a particular kind of bugginess that exposes a program to hacking. The workflow …
rate for a particular kind of bugginess that exposes a program to hacking. The workflow …
Joint modeling method of question intent detection and slot filling for domain-oriented question answering system
H Wang, D Yang, L Guo, X Zhang - Data Technologies and …, 2023 - emerald.com
Purpose Intent detection and slot filling are two important tasks in question comprehension
of a question answering system. This study aims to build a joint task model with some …
of a question answering system. This study aims to build a joint task model with some …