GCS - Global Citation Score shows the Citation Frequency based on the total count in the Web of Science. LCR - Local Cited References shows the count of cited papers within the collection. LCS - Local Citation Score shows the Citation Frequency within the
Graph-based NLP
From Language and Information Technologies
Jump to: navigation, search
The goal of this research project is to investigate efficient graph-based representations of text, and explore the application of ranking models based on such graph structures to natural language processing tasks. We bring together methods from computational linguistics and graph-theory, and combine them into a suite of innovative approaches that will improve and ultimately solve difficult problems in natural language processing. Specifically, we are currently working on the application of graph centrality algorithms to problems such as word sense disambiguation, text summarization and keyword extraction.
Mwathi. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I):
20-28(января 2019)1. Khidir, M. and Ali, A. (2011).A Comparative Study of Authentication Methods for Wi-Fi Networks. In: Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks Online, pp. 190-194. 2. Sheila, F., Bernard, E., Les, O., Karen, S.(2007). Establishing Wireless Robust security Networks: A Guide to IEEE 802.11i, NIST.US. 3. Kwang-Hyun, B., Sean, W. and David, K. (2004). A Survey of WPA and 802.11i RSN Authentication Protocols. Dartmouth College: Computer Science Technial Report TR2004-524. Available at: www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf 4. Borisov,N. , Goldberg,I. and Wagner, D.(2001). Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy: ACM Press. 5. Yizhan, S. (2006). Complexity of System Configuration Management, PhD thesis, Tufts University..