Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Big Data (1)
- GPS (1)
- Geographic Information Systems/Science (1)
- Graph Theory, Privacy, Algorithms, Experimentation, Theory (1)
- Human resource information system (1)
-
- Information privacy (1)
- Information security (1)
- Informativeness (1)
- Keyphrase extraction (1)
- Language model (1)
- Phraseness (1)
- Risk analysis (1)
- Scalable algorithms; Spatial joins; TOUCH; Indexing (1)
- Security architecture (1)
- Security legislation (1)
- Security policies (1)
- Security training (1)
- Spatial data mining (1)
- Spatial databases and GIS, Graph Theory (1)
Articles 1 - 4 of 4
Full-Text Articles in Databases and Information Systems
Query-Oriented Keyphrase Extraction, Minghui Qiu, Yaliang Li, Jing Jiang
Query-Oriented Keyphrase Extraction, Minghui Qiu, Yaliang Li, Jing Jiang
Minghui QIU
People often issue informational queries to search engines to find out more about some entities or events. While a Wikipedia-like summary would be an ideal answer to such queries, not all queries have a corresponding Wikipedia entry. In this work we propose to study query-oriented keyphrase extraction, which can be used to assist search results summarization. We propose a general method for keyphrase extraction for our task, where we consider both phraseness and informativeness. We discuss three criteria for phraseness and four ways to compute informativeness scores. Using a large Wikipedia corpus and 40 queries, our empirical evaluation shows that …
Touch: In-Memory Spatial Join By Hierarchical Data-Oriented Partitioning, Sadegh Nobari, Farhan Tauheed, Thomas Heinis, Panagiotis Karras, Stéphane Bressan, Anastasia Ailamaki
Touch: In-Memory Spatial Join By Hierarchical Data-Oriented Partitioning, Sadegh Nobari, Farhan Tauheed, Thomas Heinis, Panagiotis Karras, Stéphane Bressan, Anastasia Ailamaki
Sadegh Nobari
Efficient spatial joins are pivotal for many applications and particularly important for geographical information systems or for the simulation sciences where scientists work with spatial models. Past research has primarily focused on disk-based spatial joins; efficient in- memory approaches, however, are important for two reasons: a) main memory has grown so large that many datasets fit in it and b) the in-memory join is a very time-consuming part of all disk-based spatial joins.
Automated Extraction Of Community Mobility Measures From Gps Stream Data Using Temporal Dbscan, Sungsoon Hwang, Timothy Hanke, Christian Evans
Automated Extraction Of Community Mobility Measures From Gps Stream Data Using Temporal Dbscan, Sungsoon Hwang, Timothy Hanke, Christian Evans
Sungsoon Hwang
Inferring community mobility of patients from GPS data has received much attention in health research. Developing robust mobility (or physical activity) monitoring systems relies on the automated algorithm that classifies GPS track points into events (such as stops where activities are conducted, and routes taken) accurately. This paper describes the method that automatically extracts community mobility measures from GPS track data. The method uses temporal DBSCAN in classifying track points, and temporal filtering in removing noises (any misclassified track points). The result shows that the proposed method classifies track points with 88% accuracy. The percent of misclassified track points decreased …
Human Resource Information Systems: Information Security Concerns For Organizations, Humayun Zafar
Human Resource Information Systems: Information Security Concerns For Organizations, Humayun Zafar
Humayun Zafar
We explore HRIS and e-HR security by presenting information security fundamentals and how they pertain to organizations. With increasing use of enterprise systems such as HRIS and e-HR, security of such systems is an area that is worthy of further exploration. Even then, there is surprisingly little research in this area, albeit that extensive work is present in regard to HRIS privacy. While focusing on HRIS and e-HR security, we introduce aspects of HRIS and e-HR security and how it can be enhanced in organizations. A research model is also presented along with propositions that can guide future research.