-
1
-
-
33846288553
-
Latent Semantic Analysis using Eigenvalue Analysis for Efficient Information Retrieval
-
Ch. Aswani Kumar, S. Srinivas, "Latent Semantic Analysis using Eigenvalue Analysis for Efficient Information Retrieval", International Journal of Applied Mathematics and Computer Science, Vol. 16, No. 4, 2006, pp.551-558.
-
(2006)
International Journal of Applied Mathematics and Computer Science
, vol.16
, Issue.4
, pp. 551-558
-
-
Aswani Kumar, C.1
Srinivas, S.2
-
2
-
-
79955080812
-
Email Surveillance Using Non-negative Matrix Factorization
-
Department of Computer Science, University of Tennessee, Knoxville, TN 37996-3450.2006
-
M.W Berry, M. Browne, "Email Surveillance Using Non-negative Matrix Factorization", Technical Report, Department of Computer Science, University of Tennessee, Knoxville, TN 37996-3450.2006.
-
Technical Report
-
-
Berry, M.W.1
Browne, M.2
-
3
-
-
3843149546
-
Deception in Computer-Mediated Communication
-
J.R. Carlson, J. F. George, J. K. Burgoon, M. Adkins, C. H. White, "Deception in Computer-Mediated Communication", Group decision and negotiation, Vol. 13, 2004, pp. 5-28.
-
(2004)
Group decision and negotiation
, vol.13
, pp. 5-28
-
-
Carlson, J.R.1
George, J.F.2
Burgoon, J.K.3
Adkins, M.4
White, C.H.5
-
4
-
-
79955103697
-
-
Enron Email Dataset March 2
-
Enron Email Dataset March 2, 2004. http://www.cs.cmu.edu/~enron/.
-
(2004)
-
-
-
5
-
-
33750688875
-
Detecting Unusual and Deceptive Communication in Email
-
School of Computing, Queen's University Kingston, Canada K7L3N6. 8
-
P.S. Keila, D. B. Skillicorn, "Detecting Unusual and Deceptive Communication in Email", Technical report, School of Computing, Queen's University Kingston, Canada K7L3N6. 8 (2005a).
-
(2005)
Technical report
-
-
Keila, P.S.1
Skillicorn, D.B.2
-
6
-
-
31044437040
-
Structure in the Enron Email Dataset
-
P.S. Keila, D.B. Skillicorn, "Structure in the Enron Email Dataset", Computational and Mathematical organization theory, Vol. 11, 2005b, pp. 183-199.
-
(2005)
Computational and Mathematical organization theory
, vol.11
, pp. 183-199
-
-
Keila, P.S.1
Skillicorn, D.B.2
-
7
-
-
0032183760
-
A semi-discrete matrix decomposition for latent semantic indexing in information retrieval
-
T.G. Kolda, D.P. O'Leary, "A semi-discrete matrix decomposition for latent semantic indexing in information retrieval", ACM Transactions on Information Systems, Vol. 16, 1998, pp. 322-346.
-
(1998)
ACM Transactions on Information Systems
, vol.16
, pp. 322-346
-
-
Kolda, T.G.1
O'Leary, D.P.2
-
8
-
-
34548288901
-
On principal component analysis, Cosine and Euclidean measures in information retrieval
-
T. Korenius, J. Laurikkala, M. Juhola, "On principal component analysis, Cosine and Euclidean measures in information retrieval", Information Sciences, Vol. 177, 2007, pp. 4893 - 4905.
-
(2007)
Information Sciences
, vol.177
, pp. 4893-4905
-
-
Korenius, T.1
Laurikkala, J.2
Juhola, M.3
-
10
-
-
84898964201
-
Algorithms for Non-Negative Matrix Factorization
-
D. Lee, H. Seung, "Algorithms for Non-Negative Matrix Factorization", Advances in Neural Information Processing Systems, Vol. 13, 2001, pp. 556-562.
-
(2001)
Advances in Neural Information Processing Systems
, vol.13
, pp. 556-562
-
-
Lee, D.1
Seung, H.2
-
11
-
-
34548357215
-
Out-of-core SVD performance for document indexing
-
D. I. Martin, J. C. Martin, M. W. Berry, M. Browne, "Out-of-core SVD performance for document indexing, Applied numerical mathematics", Vol. 57, 2007, pp. 1230-1239.
-
(2007)
Applied numerical mathematics
, vol.57
, pp. 1230-1239
-
-
Martin, D.I.1
Martin, J.C.2
Berry, M.W.3
Browne, M.4
-
12
-
-
38349172091
-
The Author-Recipient-Topic Model for Topic and Role Discovery in Social Networks, with Application to Enron and Academic Email
-
A. McCallum, X. Wang, A.C. Emmanuel, "The Author-Recipient-Topic Model for Topic and Role Discovery in Social Networks, with Application to Enron and Academic Email", Journal of artificial intelligence research, Vol. 30, 2007, pp. 249-272.
-
(2007)
Journal of artificial intelligence research
, vol.30
, pp. 249-272
-
-
McCallum, A.1
Wang, X.2
Emmanuel, A.C.3
-
14
-
-
0038069226
-
Lying Words: Predicting Deception From Linguistic Styles
-
M.L. Newman, J. W. Pennebaker, D. S. Berry, J. M. Richards, "Lying Words: Predicting Deception From Linguistic Styles", Personality and Social Psychology Bulletin, Vol. 29, No. 5, 2003, pp. 665-675.
-
(2003)
Personality and Social Psychology Bulletin
, vol.29
, Issue.5
, pp. 665-675
-
-
Newman, M.L.1
Pennebaker, J.W.2
Berry, D.S.3
Richards, J.M.4
-
15
-
-
0037402669
-
Extraction and representation of context information for knowledge discovery in text
-
P. Perrin, F.E Petry, "Extraction and representation of context information for knowledge discovery in text", Information Sciences, Vol. 151, 2001, pp. 125-152.
-
(2001)
Information Sciences
, vol.151
, pp. 125-152
-
-
Perrin, P.1
Petry, F.E.2
-
16
-
-
79955086723
-
A Novel Data Mining Approach to Detect Deceptive Communications in Email Text
-
R. Rajaram, S.Balamurugan, "A Novel Data Mining Approach to Detect Deceptive Communications in Email Text", Journal of Computing and Information Technology, Vol. 15, 2007, pp. 161-169.
-
(2007)
Journal of Computing and Information Technology
, vol.15
, pp. 161-169
-
-
Rajaram, R.1
Balamurugan, S.2
-
17
-
-
29244443366
-
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System
-
S. Rawat, A. K. Pujari, V. P. Gulati, "On the Use of Singular Value Decomposition for a Fast Intrusion Detection System", Electronic Notes in Theoretical Computer Science, Vol. 142, 2006, pp. 215-228.
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.142
, pp. 215-228
-
-
Rawat, S.1
Pujari, A.K.2
Gulati, V.P.3
-
18
-
-
18144374544
-
Classification methods in the detection of new malicious mails
-
D.H. Shih, H. S. Chiang, C. D. Yen, "Classification methods in the detection of new malicious mails", Information Sciences, Vol. 172, 2005, pp. 241-261.
-
(2005)
Information Sciences
, vol.172
, pp. 241-261
-
-
Shih, D.H.1
Chiang, H.S.2
Yen, C.D.3
-
19
-
-
70450263754
-
Applying Matrix Decompositions to Counterterrorism
-
School of Computing,Queen's University, Kingston, Canada. External Technical Report ISSN-0836-0227-2004-484
-
D.B. Skillicorn "Applying Matrix Decompositions to Counterterrorism", Technical report, School of Computing,Queen's University, Kingston, Canada. External Technical Report ISSN-0836-0227-2004-484, 2004.
-
(2004)
Technical report
-
-
Skillicorn, D.B.1
-
21
-
-
79955077425
-
-
Word List, URL
-
Word List, URL:http://www.giwersworld.org/computers/linux/common-words-req.phtml and http://ogden.basic-english.org/intlword.html.
-
-
-
-
23
-
-
70449531469
-
Concept lattice reduction using fuzzy k means clustering
-
Ch. Aswani Kumar, S. Srinivas, "Concept lattice reduction using fuzzy k means clustering", Expert systems with applications, Vol. 37, 2010, pp. 2696-2704.
-
(2010)
Expert systems with applications
, vol.37
, pp. 2696-2704
-
-
Aswani Kumar, C.1
Srinivas, S.2
-
24
-
-
78650536005
-
Mining associations in health care data using formal concept analysis and singular value decomposition
-
Ch. Aswani Kumar, S. Srinivas, "Mining associations in health care data using formal concept analysis and singular value decomposition", Journal of biological systems, Vol. 18, No. 4, 2010, pp. 787-807.
-
(2010)
Journal of biological systems
, vol.18
, Issue.4
, pp. 787-807
-
-
Aswani Kumar, C.1
Srinivas, S.2
-
25
-
-
77956014999
-
A note on weighted fuzzy k-means clustering for concept decomposition
-
Ch. Aswani Kumar, S. Srinivas, "A note on weighted fuzzy k-means clustering for concept decomposition", Cybernetics and systems, Vol. 41, 2010, pp. 455-467.
-
(2010)
Cybernetics and systems
, vol.41
, pp. 455-467
-
-
Aswani Kumar, C.1
Srinivas, S.2
-
26
-
-
79955095640
-
Comparison of matrix dimensionality reduction methods in uncovering latent structures in the data
-
Ch. Aswani Kumar, R. Palanisamy, "Comparison of matrix dimensionality reduction methods in uncovering latent structures in the data", Journal of information and knowledge management, Vol. 9, No. 1, 2010, 81-92.
-
(2010)
Journal of information and knowledge management
, vol.9
, Issue.1
, pp. 81-92
-
-
Aswani Kumar, C.1
Palanisamy, R.2
-
27
-
-
77953845946
-
Analysis of unsupervised dimensionality reduction techniques
-
Ch. Aswani Kumar, "Analysis of unsupervised dimensionality reduction techniques", Computer science and information systems, Vol. 6, No.2, 2009, 217-227.
-
(2009)
Computer science and information systems
, vol.6
, Issue.2
, pp. 217-227
-
-
Aswani Kumar, C.1
|