CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Content Modeling Paradigm: an interplay of relationship between Author, Document, Topic, and Words

Published on None 2010 by Deepak Gupta
Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications
Foundation of Computer Science USA
CASCT - Number 2
None 2010
Authors: Deepak Gupta
266cd616-2a95-4396-b0a3-bcadda9264f3

Deepak Gupta . Content Modeling Paradigm: an interplay of relationship between Author, Document, Topic, and Words. Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications. CASCT, 2 (None 2010), 61-68.

@article{
author = { Deepak Gupta },
title = { Content Modeling Paradigm: an interplay of relationship between Author, Document, Topic, and Words },
journal = { Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications },
issue_date = { None 2010 },
volume = { CASCT },
number = { 2 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 61-68 },
numpages = 8,
url = { /specialissues/casct/number2/1005-40/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications
%A Deepak Gupta
%T Content Modeling Paradigm: an interplay of relationship between Author, Document, Topic, and Words
%J Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications
%@ 0975-8887
%V CASCT
%N 2
%P 61-68
%D 2010
%I International Journal of Computer Applications
Abstract

for any work of literature, a fundamental issue is to identify the individual(s) who wrote it, and conversely, to identify all of the works that belong to a given individual or to identify the individual who writes many papers on same topic or to identify the topics name that an author works on. Information extraction techniques (such as Author Name and Topic Recognition) have long been used to extract useful pieces of information from text. The types of information to be extracted are generally fixed and well defined. However in some cases, the user goal is more abstract and information types cannot be narrowly defined. For example, a reader of online user reviews typically has the goal of making a good choice and is interested to learn about the different aspects of a topic and author relation (e.g., famous author of a topic, author’s papers with his research field). Some of these aspects may be known by the reader and some others may need to be discovered from the inherent text structure in a large collection. Even for the known aspects (such as “author name” and “topic”), the challenge is to recognize various hidden aspects like number of papers written by an author, his research field, popularity of an author.

References
  1. T. F. Lunt, J. van Home, and L. Halme. Analysis of computer system audit trailsinitial data analysis. Technical Report TR-85009, Sytek, Mountain View, California,September 1985.
  2. J. van Horne and L. Halme. Analysis of computer system audit trails final report.Technical Report TR-85007, Sytek, Mountain View, California, May 1986.
  3. Peter G. Neumann. Security and integrity controls for federal, state, and local computersaccessing NCIC. Technical report, SRI International, 333 Ravenswood Avenue, MenloPark, CA 94025, June 1990.
  4. Alfonso Valdes and Debra Anderson. Statistical methods for computer usage anomalydetection using NIDES. In Conference on Rough Sets and Soft Computing, November1994.
  5. Boyd-Graber, J. & Blei, D., 2009. Syntactic Topic Models. In Neural Information ProcessingSystems.
  6. Branavan, S., Chen, H., Eisenstein, J. & Barzilay, R., 2008. Learning Document-Level Semantic Properties from Free-text Annotations. In Proceedings of ACL.
  7. Lin, J., 1991. Divergence measures based on the Shannon entropy. In IEEE Transactions onInformation Theory.
  8. Mann, G. & McCallum, A., 2008. Generalized Expectation Criteria for Semi-Supervised Learning of Conditional Random Fields. In ACL.
  9. Mccallum, A., Corrada-Emmanuel, Andres & Wang, X., 2005. Topic and Role Discovery in Social Networks. In Proceeding of IJCAI.
  10. Blei, D.M. & McAuliffe, J., 2007. Supervised topic models. In Advanced In NIPS. Blei, D.M., Ng, A.Y. & Jordan, M.I., 2003. Latent Dirichlet Allocation. In Journal of Machine Learning Research.
  11. Minka, T. & Lafferty, J., 2002. Expectation-propagation for the generative aspect model. In Proceedings of UAI.
  12. Newman, D., Chemudugunta, C. & Smyth, P., 2006. Statistical entity-topic models. In: 10th ACM SigKDD conference knowledge discovery and data mining (Seattle, 2004)
  13. Mark Steyvers, Padhrai Smyth, Thomas Grihffiths, Probabilistic Author­Topic Models for Information Discovery.
  14. H.S. Javitz and A. Valdes. The SRI statistical anomaly detector. In Proceedings of the1991 IEEE Symposium on Research in Security and Privacy, May 1991.
  15. J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
  16. T. F. Lunt, J. van Horne, and L. Halme. Automated analysis of computer system audit trails. In Proceedings of the Ninth DOE Computer Security Group Conference, May1986
  17. Waterman, D.A, (1984) A guide to Expert Systems, Reading, Addison-Wesly, Massachusetts.
  18. Blei, D.M. & Jordan, M.I., 2003. Modeling annotated data. In SIGIR '03: Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval.
  19. Chang, J. & Blei, D., 2009. Relational Topic Models for Document Networks. In Artificial Intelligence and Statistics.
  20. Cohen, J., 1960. A coefficient of agreement for nominal scales. In Education andPsychological Measuremen.
  21. Deerwester, S. et al., 1990. Indexing by latent semantic analysis. In Journal of the AmericanSociety for Information Science.
  22. Goldwater, S., Griffiths, T.L. & Johnson, M., 2006. Contextual Dependencies in Unsupervised Word Segmentation. In Proceedings of Coling/ACL.
  23. Griffiths, T.L. & Steyvers, M., 2004. Finding scientific topics. In Proc Natl Acad Sci U S A. Griffiths, T.L., Steyvers, M., Blei, D.M. & Tenenbaum, J.B., 2005.
  24. Integrating topics and Syntax. In Advances in NIPS 17.
  25. Gruber, A., Rosen-Zvi, M. & Weiss, Y., 2007. Hidden Topic Markov Models. In ArtificialIntelligence and Statistics.
  26. Haghighi, A. & Klein, D., 2007. Unsupervised Coreference Resolution in a Nonparametric Bayesian Model. In Association for Computational Linguistics.
  27. Hofmann, T., 1999. Probabilistic latent semantic analysis. In Proc. of Uncertainty in Artificial Intelligence, UAI’99.
  28. Hu, M. & Liu., B., 2004. Mining and summarizing customer reviews. In Proceedings of SIGKDD.
  29. Levin, E. & Sharifi, M., 2006. Evaluation of Utility of LSA for Word Sense Discrimination. In Proceedings of HLT/NAACL.
  30. Blei, D. & Lafferty, J., 2006. Dynamic topic models. In Proceedings of the 23rdInternational Conference on Machine Learning.
  31. Blei, D. & Lafferty, J., 2007. A correlated topic model of Science. In Annals of AppliedStatistics.
  32. Teresa Lunt. Detecting intruders in computer systems. In 1993 Conference on Auditingand Computer Technology, 1993.
  33. Next-generation Intrusion Detection Expert System by Debra AndersonThane Frivold Alfonso Valdes Computer Science Laboratory 1995
Index Terms

Computer Science
Information Sciences

Keywords

Content Modeling supervised paradigm unsupervised paradigm ATP Model TAP Model