CIKM 2015 Melbourne Australia Oct. 22, 2015 Building a Better Connected World with Data Mining and Artificial Intelligence Technologies
|
|
|
- Baldric Flynn
- 9 years ago
- Views:
Transcription
1 CIKM 2015 Melbourne Australia Oct. 22, 2015 Building a Better Connected World with Data Mining and Artificial Intelligence Technologies Hang Li Noah s Ark Lab Huawei Technologies
2
3 We want to build Intelligent Mobile Devices Data Mining & Artificial Intelligence Intelligent Telecommunication Networks Intelligent Enterprise
4 Intelligent Telecommunication Networks Software-defined Network Network Maintenance Network Planning and Optimization
5 Intelligent Enterprise Supply Chain Management Customer Relationship Management Human Resources Management Information and Knowledge Management Communication
6 Intelligent Mobile Devices Information Recommendation Information Extraction Personal Information Management Machine Translation Natural Language Dialogue(Question Answering)
7 This Talk: Natural Language Dialogue
8 Demo: Neural Responding Machine
9 Outline Information Access through Natural Language Dialogue Data-Driven Approach Single Turn Dialogue Sentence Representation Learning Our Approach Using Deep Learning Summary
10 New Paradigm in Information Retrieval? Library Search Web Search Natural Language Dialogue
11 Information Access through Natural Language Dialogue Multi-turn dialogue Goal: task completion, mostly information access Evaluation: completion / cost Including traditional search and question answering as special cases
12 Example One: Hotel Booking on Smartphone P: How may I help you? U: I'd like to book a hotel room for tomorrow. P: For how many people? U: Just me. What is the total cost? P: That would be $120 per night. U: No problem. Book the room for one night, please.
13 Example Two: Auto Call Center U: hello H: hello, how can I help you? U: can you tell me how to find ABC software? H: please go to this URL to download U: how to activate the software? H: please see this document
14 Academic research Related Work Rule-based approach, e.g., Eliza System, Weizenbaum 1964 Reinforcement learning based approach, e.g., Singh et al 1999 Machine translation based approach, e.g., Ritter et al 2011 Commercial products Apple Siri Google Now MS Cortana
15 Outline Information Access through Natural Language Dialogue Data-Driven Approach Single Turn Dialogue Sentence Representation Learning Our Approach Using Deep Learning Summary
16 Data-Driven Approach to Dialogue Will you attend ECML/PKDD 2015? Yes, I will Learning how to converse mainly from data
17 Data-Driven Approach Key Points Mainly learning from data Avoid difficult language understanding problem as much as possible Fundamental mechanism is simple Issues to Investigate Single-turn dialogue Multi -turn dialogue Knowledge utilization and reasoning (lightweight) Dialogue management (lightweight)
18 As Scientific Research Problem Not as engineering hacks Scientific methodology Mathematical modeling Result should be reproducible (positivism) Divide and conquer (reductionism)
19 Outline Information Access through Natural Language Dialogue Data-Driven Approach Single Turn Dialogue Sentence Representation Learning Our Approach Using Deep Learning Summary
20 Reducing Multi-Turn Dialogue to Single- Turn Dialogue hello U: hello H: hello, how can I help you? U: can you tell me how to find ABC software? H: please go to this URL to download U: how to activate the software? H: please see this document Breaking down multi-turn dialogues to many single-turn dialogues hello, how can I help you can you tell me how to find ABC software? please go to this URL to download how to activate the software? please see this document
21 Retrieval-based Single Turn Dialogue Repository of Message Response Pairs Retrieval System Learning System
22 Generation-based Single Turn Dialogue Generation System Learning System
23 Retrieval-based approach to single turn dialogue 5 million Chinese Weibo data, 1 million Japanese Twitter data Registration deadline: Oct 31, 2015
24 Outline Information Access through Natural Language Dialogue Data-Driven Approach Single Turn Dialogue Sentence Representation Learning Our Approach Using Deep Learning
25 Representation of Word Meaning dog cat puppy kitten Using high-dimensional real-valued vectors to represent the meaning of words
26 Representation of Sentence Meaning New finding: This is possible Mary is loved by John Mary loves John John loves Mary Using high-dimensional real-valued vectors to represent the meaning of sentences
27 Recent Breakthrough in Natural Language Processing Representations from words to sentences Compositional Representing syntax, semantics, even pragmatics
28 How Is Learning of Sentence Meaning Possible? Deep neural networks (complicated non-linear models) Big Data Task-oriented Error-reduction and gradient-based
29 Deep Learning Tools for Learning Sentence Representations Neural Word Embedding Recurrent Neural Networks Recursive Neural Networks Convolutional Neural Networks
30 Word Representation: Neural Word Embedding M c1 c2 c3 c4 c5 w 1 w 2 w log P( w, c) P( w) P( c) W T M WC t1 t2 t3 matrix factorization w 1 w 2 w word embedding or word2vec
31 Recurrent Neural Network (RNN) (Mikolov et al. 2010) On sequence of words Variable length Long dependency: LSTM or GRU the cat sat on the mat h t 1 h t f ( ht 1, xt ) the cat sat. mat x t
32 Recursive Neural Network (RNN) (Socher et al. 2013) On parse tree of sentence Learning is based on max margin parsing the cat sat on the mat the cat sat on the mat
33 Convolutional Neural Network (CNN) (Hu et al. 2014) Concatenation the cat sat on the mat the cat sat on sat on the mat Robust parsing Shared parameter on same level Fixed length, zero padding the cat sat on the mat max pooling the cat cat sat sat on on the cat sat sat on on the the mat the cat sat cat sat on sat on the on the mat convolution the cat sat on the mat
34 Outline Information Access through Natural Language Dialogue Data-Driven Approach Single Turn Dialogue Sentence Representation Learning Our Approach Using Deep Learning Summary
35 Our Models for Single-Turn Dialogue Using Deep Learning Retrieval-based Deep Match CNN (Hu et al., NIPS 2014) Deep Match Tree (Wang et al., IJCAI 2015) Generation-based Neural Responding Machine (Shang et al., ACL 2015)
36 DL for Lab Researchers Zhengdong Lu Lifeng Shang Lin Ma Zhaopeng Tu Interns Baotian Hu Fandong Meng Mingxuan Wang Han Zhao
37 Natural Language Dialogue System - Retrieval based Approach message retrieved messages and responses matched responses ranked responses online retrieval matching ranking best response offline index of messages and responses matching models ranking model
38 Deep Match CNN - Archtecture I First represent two sentences, and then match 38
39 Deep Match CNN - Architecture II Represent and match two sentences simultaneously Two dimensional convolution and pooling 39
40 Deep Match Tree Constructing deep neural network, with first layer corresponding mined patterns 40
41 Retrieval based Approach: Accuracy = 70% 上 海 今 天 好 熱, 堪 比 新 加 坡 上 海 今 天 热 的 不 一 般 想 去 武 当 山 有 想 同 游 的 么? 我 想 跟 帅 哥 同 游 ~ 哈 哈 It is very hot in Shanghai today, just like Singapore. It is unusually hot. I want to go to Mountain Wudang, it there anybody going together with me? Haha, I want to go with you, handsome boy Using 5 million Weibo Data
42 Natural Language Dialogue System - Generation based Approach Response y x y 1 Decoder c Encoder x 1 y x 2 2 Context Generator h y t x T Encoding messages to intermediate representations Decoding intermediate representations to responses Recurrent Neural Network (RNN) Message
43 Neural Responding Machine Intuitively, a big language model generating responses conditioned on messages Decoder 用 了 Global Encoder Context Generator 都 说??? Attention Signal 华 为 手 机 怎 么 样 Local Encoder 140 million parameters Trained from 5 million Weibo data
44 Generation based Approach Accuracy = 76% 占 中 终 于 结 束 了 Occupy Central is finally over. 下 一 个 是 陆 家 嘴 吧? 我 想 买 三 星 手 机 Will Lujiazui (finance district in Shanghai) be the next? I want to buy a Samsung phone 还 是 支 持 一 下 国 产 的 吧 Let us support our national brands vs. Accuracy of translation approach = 26% Accuracy of retrieval based approach = 70%
45 Outline Information Access through Natural Language Dialogue Data-Driven Approach Single Turn Dialogue Sentence Representation Learning Our Approach Using Deep Learning Summary
46 Take-away Messages Natural language dialogue = new paradigm for information retrieval Data-driven approach is key Current focus is single turn dialogue Sentence representation learning is possible Significant progress being made on single-turn dialogue with deep learning and big data Many interesting and challenging problems to be tackled
47 Thank you!
Learning to Process Natural Language in Big Data Environment
CCF ADL 2015 Nanchang Oct 11, 2015 Learning to Process Natural Language in Big Data Environment Hang Li Noah s Ark Lab Huawei Technologies Part 1: Deep Learning - Present and Future Talk Outline Overview
Steven C.H. Hoi School of Information Systems Singapore Management University Email: [email protected]
Steven C.H. Hoi School of Information Systems Singapore Management University Email: [email protected] Introduction http://stevenhoi.org/ Finance Recommender Systems Cyber Security Machine Learning Visual
Applications of Deep Learning to the GEOINT mission. June 2015
Applications of Deep Learning to the GEOINT mission June 2015 Overview Motivation Deep Learning Recap GEOINT applications: Imagery exploitation OSINT exploitation Geospatial and activity based analytics
Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15
Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15 GENIVI is a registered trademark of the GENIVI Alliance in the USA and other countries Copyright GENIVI Alliance
User Modeling in Big Data. Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大
User Modeling in Big Data Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大 Who we are: Noah s Ark LAB Have you watched the movie 2012?
The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2
2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of
A picture is worth five captions
A picture is worth five captions Learning visually grounded word and sentence representations Grzegorz Chrupała (with Ákos Kádár and Afra Alishahi) Learning word (and phrase) meanings Cross-situational
Search Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
Core Curriculum to the Course:
Core Curriculum to the Course: Environmental Science Law Economy for Engineering Accounting for Engineering Production System Planning and Analysis Electric Circuits Logic Circuits Methods for Electric
Deep Learning For Text Processing
Deep Learning For Text Processing Jeffrey A. Bilmes Professor Departments of Electrical Engineering & Computer Science and Engineering University of Washington, Seattle http://melodi.ee.washington.edu/~bilmes
Doing Multidisciplinary Research in Data Science
Doing Multidisciplinary Research in Data Science Assoc.Prof. Abzetdin ADAMOV CeDAWI - Center for Data Analytics and Web Insights Qafqaz University [email protected] http://ce.qu.edu.az/~aadamov 16 May
Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines
, 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing
Lecture 6: CNNs for Detection, Tracking, and Segmentation Object Detection
CSED703R: Deep Learning for Visual Recognition (206S) Lecture 6: CNNs for Detection, Tracking, and Segmentation Object Detection Bohyung Han Computer Vision Lab. [email protected] 2 3 Object detection
AnalysisofData MiningClassificationwithDecisiontreeTechnique
Global Journal of omputer Science and Technology Software & Data Engineering Volume 13 Issue 13 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Convolutional Feature Maps
Convolutional Feature Maps Elements of efficient (and accurate) CNN-based object detection Kaiming He Microsoft Research Asia (MSRA) ICCV 2015 Tutorial on Tools for Efficient Object Detection Overview
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
Deep learning applications and challenges in big data analytics
Najafabadi et al. Journal of Big Data (2015) 2:1 DOI 10.1186/s40537-014-0007-7 RESEARCH Open Access Deep learning applications and challenges in big data analytics Maryam M Najafabadi 1, Flavio Villanustre
PhD in Computer Science and Engineering Bologna, April 2016. Machine Learning. Marco Lippi. [email protected]. Marco Lippi Machine Learning 1 / 80
PhD in Computer Science and Engineering Bologna, April 2016 Machine Learning Marco Lippi [email protected] Marco Lippi Machine Learning 1 / 80 Recurrent Neural Networks Marco Lippi Machine Learning
Recognition. Sanja Fidler CSC420: Intro to Image Understanding 1 / 28
Recognition Topics that we will try to cover: Indexing for fast retrieval (we still owe this one) History of recognition techniques Object classification Bag-of-words Spatial pyramids Neural Networks Object
RESEARCH ON THE FRAMEWORK OF SPATIO-TEMPORAL DATA WAREHOUSE
RESEARCH ON THE FRAMEWORK OF SPATIO-TEMPORAL DATA WAREHOUSE WANG Jizhou, LI Chengming Institute of GIS, Chinese Academy of Surveying and Mapping No.16, Road Beitaiping, District Haidian, Beijing, P.R.China,
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
Tech Presentation 2016
Tech Presentation 2016 Our Management Team Marvin Igelman CEO Alex Zivkovic CTO David Berman CFO Matt Burns PM and Growth BreakingSports is the world s first fully automated real-time alerts platform for
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the
A1 Introduction to Data exploration and Machine Learning
A1 Introduction to Data exploration and Machine Learning 03563545 :- : -:: -,8 / 15 23CE53C5 --- Proposition: This course is aimed at students with little or no prior programming experience. Since Data
Sense Making in an IOT World: Sensor Data Analysis with Deep Learning
Sense Making in an IOT World: Sensor Data Analysis with Deep Learning Natalia Vassilieva, PhD Senior Research Manager GTC 2016 Deep learning proof points as of today Vision Speech Text Other Search & information
A Framework-based Online Question Answering System. Oliver Scheuer, Dan Shen, Dietrich Klakow
A Framework-based Online Question Answering System Oliver Scheuer, Dan Shen, Dietrich Klakow Outline General Structure for Online QA System Problems in General Structure Framework-based Online QA system
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Gated Neural Networks for Targeted Sentiment Analysis
Gated Neural Networks for Targeted Sentiment Analysis Meishan Zhang 1,2 and Yue Zhang 2 and Duy-Tin Vo 2 1. School of Computer Science and Technology, Heilongjiang University, Harbin, China 2. Singapore
Big Data and Scripting. (lecture, computer science, bachelor/master/phd)
Big Data and Scripting (lecture, computer science, bachelor/master/phd) Big Data and Scripting - abstract/organization abstract introduction to Big Data and involved techniques lecture (2+2) practical
Microblog Sentiment Analysis with Emoticon Space Model
Microblog Sentiment Analysis with Emoticon Space Model Fei Jiang, Yiqun Liu, Huanbo Luan, Min Zhang, and Shaoping Ma State Key Laboratory of Intelligent Technology and Systems, Tsinghua National Laboratory
Recurrent Neural Networks
Recurrent Neural Networks Neural Computation : Lecture 12 John A. Bullinaria, 2015 1. Recurrent Neural Network Architectures 2. State Space Models and Dynamical Systems 3. Backpropagation Through Time
CS4025: Pragmatics. Resolving referring Expressions Interpreting intention in dialogue Conversational Implicature
CS4025: Pragmatics Resolving referring Expressions Interpreting intention in dialogue Conversational Implicature For more info: J&M, chap 18,19 in 1 st ed; 21,24 in 2 nd Computing Science, University of
CoolaData Predictive Analytics
CoolaData Predictive Analytics 9 3 6 About CoolaData CoolaData empowers online companies to become proactive and predictive without having to develop, store, manage or monitor data themselves. It is an
How To Make Sense Of Data With Altilia
HOW TO MAKE SENSE OF BIG DATA TO BETTER DRIVE BUSINESS PROCESSES, IMPROVE DECISION-MAKING, AND SUCCESSFULLY COMPETE IN TODAY S MARKETS. ALTILIA turns Big Data into Smart Data and enables businesses to
Prerequisites. Course Outline
MS-55040: Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot Description This three-day instructor-led course will introduce the students to the concepts of data mining,
Semester Review. CSC 301, Fall 2015
Semester Review CSC 301, Fall 2015 Programming Language Classes There are many different programming language classes, but four classes or paradigms stand out:! Imperative Languages! assignment and iteration!
Why is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
The Need for Training in Big Data: Experiences and Case Studies
The Need for Training in Big Data: Experiences and Case Studies Guy Lebanon Amazon Background and Disclaimer All opinions are mine; other perspectives are legitimate. Based on my experience as a professor
Matrix Logic WirelessDMS Email Service 2.0
Matrix Logic WirelessDMS Email Service 2.0 Version 2.0 August 2009. WHAT IS WDMS EMAIL SERVICE?...2 FEATURES OF WDMS EMAIL SERVICE...3 HOW DOES WDMS EMAIL SERVICE WORK?...4 REQUIREMENTS...5 Server Prerequesites...5
An Introduction to Data Mining
An Introduction to Intel Beijing [email protected] January 17, 2014 Outline 1 DW Overview What is Notable Application of Conference, Software and Applications Major Process in 2 Major Tasks in Detail
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 5 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 5 INTELLIGENT MULTIDIMENSIONAL DATABASE INTERFACE Mona Gharib Mohamed Reda Zahraa E. Mohamed Faculty of Science,
Natural Language to Relational Query by Using Parsing Compiler
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
INFORMATION TECHNOLOGY (IT) 515
INFORMATION TECHNOLOGY (IT) 515 202 Old Union, (309) 438-8338 Web address: IT.IllinoisState.edu Director: Mary Elaine Califf. Tenured/Tenure-track Faculty: Professors: Gyires, Li, Lim, Mahatanankoon. Associate
David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Topic: Big Data - The Next Phase Abstract
David G. Belanger, PhD, Senior Research Fellow, Stevens Institute of Technology, New Jersey, USA Dr. David Belanger is currently a Senior Research Fellow at Stevens Institute of Technology. In this role
Artificial Intelligence for ICT Innovation
2016 ICT 산업전망컨퍼런스 Artificial Intelligence for ICT Innovation October 5, 2015 Sung-Bae Cho Dept. of Computer Science, Yonsei University http://sclab.yonsei.ac.kr Subjective AI Hype Cycle Expert System Neural
COURSE TITLE COURSE DESCRIPTION
COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.
Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008
Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report
The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network
, pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and
Taking Inverse Graphics Seriously
CSC2535: 2013 Advanced Machine Learning Taking Inverse Graphics Seriously Geoffrey Hinton Department of Computer Science University of Toronto The representation used by the neural nets that work best
Module Catalogue for the Bachelor Program in Computational Linguistics at the University of Heidelberg
Module Catalogue for the Bachelor Program in Computational Linguistics at the University of Heidelberg March 1, 2007 The catalogue is organized into sections of (1) obligatory modules ( Basismodule ) that
Intelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
School District of Springfield Township
School District of Springfield Township Springfield Township High School Course Overview Course Name: Computer Science Basics Grade(s) Level: 9-12 Course Description Computer Science Basics provides students
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
Data, Measurements, Features
Data, Measurements, Features Middle East Technical University Dep. of Computer Engineering 2009 compiled by V. Atalay What do you think of when someone says Data? We might abstract the idea that data are
8. Machine Learning Applied Artificial Intelligence
8. Machine Learning Applied Artificial Intelligence Prof. Dr. Bernhard Humm Faculty of Computer Science Hochschule Darmstadt University of Applied Sciences 1 Retrospective Natural Language Processing Name
Data Mining Techniques
15.564 Information Technology I Business Intelligence Outline Operational vs. Decision Support Systems What is Data Mining? Overview of Data Mining Techniques Overview of Data Mining Process Data Warehouses
Introduction to Data Mining
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE Kasra Madadipouya 1 1 Department of Computing and Science, Asia Pacific University of Technology & Innovation ABSTRACT Today, enormous amount of data
Fall 2012 Q530. Programming for Cognitive Science
Fall 2012 Q530 Programming for Cognitive Science Aimed at little or no programming experience. Improve your confidence and skills at: Writing code. Reading code. Understand the abilities and limitations
Network Big Data: Facing and Tackling the Complexities Xiaolong Jin
Network Big Data: Facing and Tackling the Complexities Xiaolong Jin CAS Key Laboratory of Network Data Science & Technology Institute of Computing Technology Chinese Academy of Sciences (CAS) 2015-08-10
Chapter 1. Dr. Chris Irwin Davis Email: [email protected] Phone: (972) 883-3574 Office: ECSS 4.705. CS-4337 Organization of Programming Languages
Chapter 1 CS-4337 Organization of Programming Languages Dr. Chris Irwin Davis Email: [email protected] Phone: (972) 883-3574 Office: ECSS 4.705 Chapter 1 Topics Reasons for Studying Concepts of Programming
Machine Learning CS 6830. Lecture 01. Razvan C. Bunescu School of Electrical Engineering and Computer Science [email protected]
Machine Learning CS 6830 Razvan C. Bunescu School of Electrical Engineering and Computer Science [email protected] What is Learning? Merriam-Webster: learn = to acquire knowledge, understanding, or skill
Latent variable and deep modeling with Gaussian processes; application to system identification. Andreas Damianou
Latent variable and deep modeling with Gaussian processes; application to system identification Andreas Damianou Department of Computer Science, University of Sheffield, UK Brown University, 17 Feb. 2016
01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
A Framework for Personalized Healthcare Service Recommendation
A Framework for Personalized Healthcare Service Recommendation Choon-oh Lee, Minkyu Lee, Dongsoo Han School of Engineering Information and Communications University (ICU) Daejeon, Korea {lcol, niklaus,
EVILSEED: A Guided Approach to Finding Malicious Web Pages
+ EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
Clustering Big Data. Anil K. Jain. (with Radha Chitta and Rong Jin) Department of Computer Science Michigan State University November 29, 2012
Clustering Big Data Anil K. Jain (with Radha Chitta and Rong Jin) Department of Computer Science Michigan State University November 29, 2012 Outline Big Data How to extract information? Data clustering
TDWI Best Practice BI & DW Predictive Analytics & Data Mining
TDWI Best Practice BI & DW Predictive Analytics & Data Mining Course Length : 9am to 5pm, 2 consecutive days 2012 Dates : Sydney: July 30 & 31 Melbourne: August 2 & 3 Canberra: August 6 & 7 Venue & Cost
Artificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence
Artificial Neural Networks and Support Vector Machines CS 486/686: Introduction to Artificial Intelligence 1 Outline What is a Neural Network? - Perceptron learners - Multi-layer networks What is a Support
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
Masters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
Automatic Knowledge Base Construction Systems. Dr. Daisy Zhe Wang CISE Department University of Florida September 3th 2014
Automatic Knowledge Base Construction Systems Dr. Daisy Zhe Wang CISE Department University of Florida September 3th 2014 1 Text Contains Knowledge 2 Text Contains Automatically Extractable Knowledge 3
THE DO S AND DON TS OF WEB CHAT. with Johan Jacobs
THE DO S AND DON TS OF WEB CHAT with Johan Jacobs TABLE OF CONTENTS Introduction. 3 Best Practice #1: Commit or Skip..4 Best Practice #2: Run Multiple Sessions from Day One 6 Best Practice #3: Never Make
Healthcare data analytics. Da-Wei Wang Institute of Information Science [email protected]
Healthcare data analytics Da-Wei Wang Institute of Information Science [email protected] Outline Data Science Enabling technologies Grand goals Issues Google flu trend Privacy Conclusion Analytics
Big-Data Computing with Smart Clouds and IoT Sensing
A New Book from Wiley Publisher to appear in late 2016 or early 2017 Big-Data Computing with Smart Clouds and IoT Sensing Kai Hwang, University of Southern California, USA Min Chen, Huazhong University
An Introduction to Deep Learning
Thought Leadership Paper Predictive Analytics An Introduction to Deep Learning Examining the Advantages of Hierarchical Learning Table of Contents 4 The Emergence of Deep Learning 7 Applying Deep-Learning
Mining Signatures in Healthcare Data Based on Event Sequences and its Applications
Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
Data Mining and Exploration. Data Mining and Exploration: Introduction. Relationships between courses. Overview. Course Introduction
Data Mining and Exploration Data Mining and Exploration: Introduction Amos Storkey, School of Informatics January 10, 2006 http://www.inf.ed.ac.uk/teaching/courses/dme/ Course Introduction Welcome Administration
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
Active Learning SVM for Blogs recommendation
Active Learning SVM for Blogs recommendation Xin Guan Computer Science, George Mason University Ⅰ.Introduction In the DH Now website, they try to review a big amount of blogs and articles and find the
Dan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
Image Search by MapReduce
Image Search by MapReduce COEN 241 Cloud Computing Term Project Final Report Team #5 Submitted by: Lu Yu Zhe Xu Chengcheng Huang Submitted to: Prof. Ming Hwa Wang 09/01/2015 Preface Currently, there s
What to Mine from Big Data? Hang Li Noah s Ark Lab Huawei Technologies
What to Mine from Big Data? Hang Li Noah s Ark Lab Huawei Technologies Big Data Value Two Main Issues in Big Data Mining Agenda Four Principles for What to Mine Stories regarding to Principles Search and
