Filters








17,592 Hits in 7.1 sec

Mitigation Procedures to Rank Experts through Information Retrieval Measures [article]

Matthieu Vergne
2016 arXiv   pre-print
In order to find experts, different approaches build rankings of people, assuming that they are ranked by level of expertise, and use typical Information Retrieval (IR) measures to evaluate their effectiveness  ...  To improve this state of the art, we propose to revise the formalism used in IR to design proper measures for comparing expert rankings.  ...  Mitigation Procedures In order to investigate properly existing measures, it is important to consider the specific requirements of our expert rankings: the fact that they represent an order only, which  ... 
arXiv:1603.04953v1 fatcat:vhdx5tcqerhndcwlcevedmzmei

Ranking user's relevance to a topic through link analysis on web logs

Jidong Wang, Zheng Chen, Li Tao, Wei-Ying Ma, Liu Wenyin
2002 Proceedings of the fourth international workshop on Web information and data management - WIDM '02  
The experimental results show that our approach has achieved 53% of accuracy when ranking the web-user's relevance to a search topic.  ...  In contrast to traditional methods that are purely based on textual analysis, our approach calculates the web-user's relevance through link analysis under a unified framework where the importance of web-pages  ...  Link analysis may face the problem of "topic drift" since no content information is considered in ranking procedure.  ... 
doi:10.1145/584938.584942 fatcat:e3dqfwsngjawnhmyhsfr7jesn4

Ranking user's relevance to a topic through link analysis on web logs

Jidong Wang, Zheng Chen, Li Tao, Wei-Ying Ma, Liu Wenyin
2002 Proceedings of the fourth international workshop on Web information and data management - WIDM '02  
The experimental results show that our approach has achieved 53% of accuracy when ranking the web-user's relevance to a search topic.  ...  In contrast to traditional methods that are purely based on textual analysis, our approach calculates the web-user's relevance through link analysis under a unified framework where the importance of web-pages  ...  Link analysis may face the problem of "topic drift" since no content information is considered in ranking procedure.  ... 
doi:10.1145/584931.584942 dblp:conf/widm/WangCTMW02 fatcat:hmt5of24gzhlrdmghk2zc5xw4e

Interpretable Self-supervised Multi-task Learning for COVID-19 Information Retrieval and Extraction [article]

Nima Ebadi, Peyman Najafirad
2021 arXiv   pre-print
The rapidly evolving literature of COVID-19 related articles makes it challenging for NLP models to be effectively trained for information retrieval and extraction with the corresponding labeled data that  ...  In the light of these challenges, this study proposes an interpretable self-supervised multi-task learning model to jointly and effectively tackle the tasks of information retrieval (IR) and extraction  ...  We aim to identify other situations which cause drastic changes and growth in the literature and examine how such models would perform in mitigating those challenges.  ... 
arXiv:2106.08252v1 fatcat:eezyxhaywjb4xkbxpdqrqnrnla

The End-of-End-to-End: A Video Understanding Pentathlon Challenge (2020) [article]

Samuel Albanie, Yang Liu, Arsha Nagrani, Antoine Miech, Ernesto Coto, Ivan Laptev, Rahul Sukthankar, Bernard Ghanem, Andrew Zisserman, Valentin Gabeur, Chen Sun, Karteek Alahari (+9 others)
2020 arXiv   pre-print
The objective of the challenge was to explore and evaluate new methods for text-to-video retrieval-the task of searching for content within a corpus of videos using natural language queries.  ...  Acknowledgements The organisers would like to express their gratitude to the creators of the original datasets used in this challenge.  ...  They would like to thank in particular Juan Carlos Niebles, Ranjay Krishna, Luowei Zhou, Lisa Ann Hendricks, Jun Xu, Tao Mei, Ting Yao, Yong Rui, David L.  ... 
arXiv:2008.00744v1 fatcat:nzcbjgvzibfstehtxrtaoxegbm

KNOWLEDGE MAPPING PROCESS MODEL FOR RISK MITIGATION IN SOFTWARE MANAGEMENT

Bokolo Anthony Jnr, Noraini Che Pa, Rozi Nor Haizan Nor, Yusmadi Jah Josoh
2017 International Journal of Software Engineering and Computer Systems  
As software organizations try to mitigate operational and technical risk that occurs when using software, there is need to develop a knowledge intensive system to assist team members in mitigating both  ...  Thus this paper proposes a knowledge mapping process model to assist in mitigating risk (operational and technical) that occurs in software organizations.  ...  Applying knowledge mapping for risk mitigation provides a comprehensive environment for mitigating risk through integrated information retrieval, information sharing for efficient risk measurement and  ... 
doi:10.15282/ijsecs.3.2017.1.0023 fatcat:2vceih5grrbxdlarnvqgly62pq

Near-misses are an opportunity to improve patient safety

Harriette Van Spall, Alisha Kassam, Travis T. Tollefson
2015 Current Opinion in Otolaryngology & Head and Neck Surgery  
review Near-miss investigations in high reliability organizations (HROs) aim to mitigate risk and improve system safety.  ...  A 16-year-old girl presented to an outpatient surgery center for a routine otolaryngology procedure. After an uncomplicated surgical procedure, the patient was emerging from general anesthesia.  ...  There are challenges to retrieve objective information about the events is absent when harm is averted so this could serve as a facilitator of a nearmiss reporting.  ... 
doi:10.1097/moo.0000000000000177 pmid:26126125 fatcat:uqvuu4jinzbifaqsq3cfphevri

Similarity-Based Clustering and Security Assurance Model for Big Data Processing in Cloud Environment

PARTHIBAN KRISHNAMOORTHY, SUJATHA SUNDARAM
2018 ECONOMIC COMPUTATION AND ECONOMIC CYBERNETICS STUDIES AND RESEARCH  
Those clusters get subjected to adopt with Similarity-ranking (S-r) scheming that tends to rank those clusters relying upon the similarity assessed.  ...  Consequently, this influences the fabrication of an expertise web service recommendation system that serves with an ability to reach an utmost proficiency in retrieving web services.  ...  In order to avoid the mess up with the ranked procedures, these details are archived in the server after employing an encrypting procedure.  ... 
doi:10.24818/18423264/52.2.18.11 fatcat:c6etxjr3kzdvbbwlt4pvgbtud4

Risk Quantification for New Product Design and Development in a Concurrent Engineering Environment

B. Kayis, G. Arndt, M. Zhou, S. Savci, Y.B. Khoo, A. Rispler
2006 CIRP annals  
This approach enables the concurrency between risk items to be captured and the cumulative effects of dependencies between risk events to be determined.  ...  Bayesian Belief Networks are applied to map the relationships between risk events in a product's life-cycle.  ...  The information gathered through expert judgements is used to compile pair-wise comparisons to feed the AHP.  ... 
doi:10.1016/s0007-8506(07)60386-2 fatcat:jxursze5kbhx3czqlgteefpshy

The voting model for people search

Craig Macdonald
2009 SIGIR Forum  
The thesis investigates how persons in an enterprise organisation can be ranked in response to a query, so that those persons with relevant expertise to the query topic are ranked first.  ...  His supervision has taught me how to combine ideas from different areas to inspire new creations, while his attention to detail has enabled this work to flourish.  ...  An expert search system should aim to rank candidate experts while maximising the traditional evaluation measures in IR: precision, the fraction of retrieved candidates that have relevant expertise to  ... 
doi:10.1145/1670598.1670616 fatcat:loqagreqk5h27n5owrkoxmak4q

An Evaluation Study of Urban Development Strategy Based on of Extreme Climate Conditions

Li-Shin Kao, Yin-Hao Chiu, Chi-Yao Tsai
2017 Sustainability  
The present study attempts to look into sustainable development policies that seek to prevent disasters through an expert questionnaire.  ...  and mitigation and to increase the effects of resilience, thus, achieving the goal of sustainable development.  ...  Establishment and Application of the Procedure for the Climate Responsive Strategy for Urban Planning The FDM was employed to select the assessment indices and the ANP was subsequently adopted to rank  ... 
doi:10.3390/su9020284 fatcat:ezutr7s55fe57da3w36qu5627a

Information Retrieval with a Hybrid Automatic Query Expansion and Data Fusion Procedure

Yunjie Xu, Michel Benaroch
2005 Information retrieval (Boston)  
We propose a hybrid information retrieval (IR) procedure that builds on two well-known IR approaches: data fusion and query expansion via relevance feedback.  ...  This IR procedure is designed to exploit the strengths of data fusion and relevance feedback and to avoid some weaknesses of these approaches.  ...  We first proved the proposition that the result integration measure-sum of cosines-is an adequate measure for ranking the retrieval results of multiple queries.  ... 
doi:10.1023/b:inrt.0000048496.31867.62 fatcat:qobvsavygzfgtopb63mymzpgvm

Analysis of a Vector Space Model, Latent Semantic Indexing and Formal Concept Analysis for Information Retrieval

Ch. Aswani Kumar, M. Radvansky, J. Annapurna
2012 Cybernetics and Information Technologies  
Latent Semantic Indexing (LSI), a variant of classical Vector Space Model (VSM), is an Information Retrieval (IR) model that attempts to capture the latent semantic relationship between the data items.  ...  Mathematical lattices, under the framework of Formal Concept Analysis (FCA), represent conceptual hierarchies in data and retrieve the information.  ...  Introduction Information Retrieval (IR) deals with the representation, storage, organization and access to information items.  ... 
doi:10.2478/cait-2012-0003 fatcat:xg4frfdvafdsrnkdu7hq2op4be

A conceptual framework for semantic case-based safety analysis

Olawande Daramola, Tor Stalhane, Thomas Moser, Stefan Biffl
2011 ETFA2011  
We present the core technologies of the conceptual framework and evaluated a prototype of the framework, KROSA, in an experiment with domain experts at ABB Norway.  ...  Hazard and Operability (HAZOP) Analysis and Failure Mode and Effect Analysis (FMEA) are among the most widely used safety analysis procedures in the development of safety-critical and embedded systems.  ...  Retrieval by the CBR module is performed by displaying a ranked list of cases similar to a target case.  ... 
doi:10.1109/etfa.2011.6058981 dblp:conf/etfa/DaramolaSMB11 fatcat:2f36ac2jxzfkdinlzpwqhzv7ke

Identifying the Potential of RFID in Disaster Healthcare: An International Delphi Study

Samaneh Madanian, Dave Parry
2021 Electronics  
The Delphi participants were the field experts in the areas of disaster management, disaster medicine, and information systems.  ...  Two rounds of questionnaires were administered to a panel of experts to evaluate the actual and potential use of RFID applications for healthcare within DMC.  ...  Acknowledgments: The authors would like to thank Tony Norris for his support and contribution to the overall PhD research. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10212621 fatcat:oj4wvm2kjjcmtgczkchcrstkda
« Previous Showing results 1 — 15 out of 17,592 results