Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Patrick Mackey"'
Publikováno v:
Open Praxis, Vol 13, Iss 4 (2022)
This paper explores the redesign of a course in Digital Storytelling that integrates metaliteracy to advance Collaborative Online International Learning (COIL). Students from the United States and Prague, Czech Republic are active participants in thi
Externí odkaz:
https://doaj.org/article/fdc26036fee74dfa8273d3e5285fd4df
Autor:
Sumit Purohit, Patrick Mackey, William Smith, Madelyn Dunning, Miquette J Orren, Trevor M Langlie-Miletich, Rahul D Deshmukh, Ankur Bohra, Tonya J Martin, Dan J Aimone, George Chin
Publikováno v:
2021 IEEE International Conference on Big Data (Big Data).
Publikováno v:
2021 IEEE Fourth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE).
Autor:
George Chin, Natalie C. Heller, Christopher L. Ebsch, Rahul Deshmukh, Patrick Mackey, Joseph A. Cottam
Publikováno v:
IEEE BigData
In the real world, data does not come neatly packaged. Instead, it typically comes as small updates from many sources with different conventions. Building a single, cohesive knowledge-base to work from requires merging small updates from many differe
Publikováno v:
IEEE BigData
When searching for adversarial activity within multiple networks, one of the greatest challenges is how to accurately align entities across different channels of information. This task becomes increasingly difficult when minimal additional informatio
Publikováno v:
IEEE BigData
Network simulation is essential to test adversarial search problems for privacy preservation and benchmarking purposes. Different generative models have been developed for single-channel, homogeneous networks that model social networks, communication
Publikováno v:
IEEE BigData
A useful technique for adversary activity graph analytics is to perform subgraph isomorphism; searching for a specific graph pattern within a larger graph. Many of the networks that may be useful for adversary activity analysis are temporal networks,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5af89d77573cbdffd79823ed061661e6
http://arxiv.org/abs/1801.08098
http://arxiv.org/abs/1801.08098
Publikováno v:
IEEE Computer Graphics and Applications. 34:42-51
Contingency analysis employs different measures to model scenarios, analyze them, and then derive the best response to any threats. A proposed visual-analytics pipeline for power grid management can transform approximately 100 million contingency sce
Publikováno v:
IEEE Computer Graphics and Applications. 33:88-96
The prevailing choices to graphically represent a social network are a node-link graph and an adjacency matrix. Both techniques have unique strengths and weaknesses for different domain applications. This article focuses on how to change adjacency ma