Abstract is missing.
- Approaches and Techniques for Analysing WiFi Location DataClement Roux, John McAuley, James Little. 1-12 [doi]
- Assessing the Usefulness of Different Feature Sets for Predicting the Comprehension Difficulty of TextBrian Mac Namee, John D. Kelleher, Noel Fitzpatrick. 12-25 [doi]
- Finding Niche Topics using Semi-Supervised Topic Modeling via Word EmbeddingsGerald Conheady, Derek Greene. 36-48 [doi]
- A Comparison on the Classification of Short-text Documents Using Latent Dirichlet Allocation and Formal Concept AnalysisNoel Rogers, Luca Longo. 50-62 [doi]
- Synthetic Dataset Generation for Online Topic ModelingMark Belford, Brian Mac Namee, Derek Greene. 63-75 [doi]
- Extending Jensen Shannon Divergence to Compare Multiple CorporaJinghui Lu, Maeve Henchion, Brian Mac Namee. 76-88 [doi]
- Pinyin as Subword Unit for Chinese-Sourced Neural Machine TranslationJinhua Du, Andy Way. 89-101 [doi]
- How Short is a Piece of String? : The Impact of Text Length and Text Augmentation on Short-text ClassificationAustin Mccartney, Svetlana Hensman, Luca Longo. 102-114 [doi]
- Semi-Supervised Overlapping Community Finding with Pairwise ConstraintsElham Alghamdi, Derek Greene. 115-127 [doi]
- How Do Distance Runners Experience Inner Speech? An Empirical InvestigationBrendan Duggan. 128-138 [doi]
- A Cognitive Learning Model that Combines Feature Formation and Event PredictionEman Awad, Fintan Costello. 139-151 [doi]
- Inferring Destination from Mobility DataAli Naeem, Kenneth Brown. 153-165 [doi]
- Inferring Waypoints in the Absence of Knowledge of Driving StyleDaniel A. Desmond, Kenneth N. Brown. 166-178 [doi]
- On the Relationship between Sampling Rate and Hidden Markov Models Accuracy in Non-Intrusive Load MonitoringSteven Lynch, Luca Longo. 180-192 [doi]
- Multi-Resolution Forecast Aggregation for Time Series in Agri DatasetsFouad Bahrpeyma, Mark Roantree, Andrew McCarren. 193-205 [doi]
- Multi-level Attention-Based Neural Networks for Distant Supervised Relation ExtractionLinyi Yang, Tin Lok James Ng, Catherine Mooney, Ruihai Dong. 206-218 [doi]
- Evaluation of Data Mining Techniques for Two Child-related Social ProblemsJames Little, Hayder Abdulabbas Waheed, Andy Rixon. 219-231 [doi]
- Adoption, Architecture and Technology of Enterprise IoT Systems - Towards a Framework of Concerns in IoT EnvironmentsMirona Popescu, Dan Dumitriu, Markus Helfert. 232-244 [doi]
- A Computational Lymph Tissue Model for Long Term HIV Infection Progression and Immune FitnessAndreas Hillmann, Martin Crane, Heather J. Ruskin. 245-257 [doi]
- Abusive Text Detection Using Neural NetworksHao Chen, Susan McKeever, Sarah Jane Delany. 258-260 [doi]
- DNS Traffic Analysis for Botnet DetectionMonika Wielogorska, Darragh O'Brien. 261-271 [doi]
- Sentiment Analysis of Online Reviews Using Bag-of-Words and LSTM ApproachesJames Barry. 272-274 [doi]
- Colwell's Castle Defence: A Custom Game Using Dynamic Difficulty Adjustment to Increase Player EnjoymentAnthony Colwell, Frank G. Glavin. 275-282 [doi]
- Sentiment Evaluation: User, Business Assessment and Hashtag AnalysisChetan Jha, Ray Walshe. 283-294 [doi]
- Supervised and Unsupervised Approaches to the Ontology-Based Disambiguation of JSON DocumentsChinmay Choudhary, Matthias Nickles, Colm O'Riordan. 295-307 [doi]
- Building High Usability Consumer-oriented Linked Data Mobile AppsYing Wang, Rob Brennan. 295-307 [doi]