Computer Science & Engineering: المرسلات الحديثة
السجلات المعروضة 161 -- 180 من 2520
-
bigIR at TREC 2021: Adopting Transfer Learning for News Background Linking
( National Institute of Standards and Technology (NIST) , 2021 , Conference)In this paper, we present the participation of the bigIR team at Qatar University in the TREC 2021 news track. We participated in the background linking task. The task mainly aims to retrieve news articles that provide ... -
Overview of the CLEF-2021 CheckThat! Lab Task 2 on detecting previously fact-checked claims in tweets and political debates
( CEUR-WS , 2021 , Conference)We describe the fourth edition of the CheckThat! Lab, part of the 2021 Conference and Labs of the Evaluation Forum (CLEF). The lab evaluates technology supporting three tasks related to factuality, and it covers Arabic, ... -
Arabic machine reading comprehension on the Holy Qur'an using CL-AraBERT
( Elsevier , 2022 , Article)In this work, we tackle the problem of machine reading comprehension (MRC) on the Holy Qur'an to address the lack of Arabic datasets and systems for this important task. We construct QRCD as the first Qur'anic Reading ... -
ECAsT: a large dataset for conversational search and an evaluation of metric robustness
( PeerJ Inc. , 2023 , Article)The Text REtrieval Conference Conversational assistance track (CAsT) is an annual conversational passage retrieval challenge to create a large-scale open-domain conversational search benchmarking. However, as of yet, the ... -
Qur'an QA 2023 Shared Task: Overview of Passage Retrieval and Reading Comprehension Tasks over the Holy Qur'an
( Association for Computational Linguistics (ACL) , 2023 , Conference)Motivated by the need for intelligent question answering (QA) systems on the Holy Qur'an and the success of the first Qur'an Question Answering shared task (Qur'an QA 2022 at OSACT 2022), we have organized the second version ... -
Overview of the CLEF-2023 CheckThat! Lab Task 5 on Authority Finding in Twitter
( CEUR-WS , 2023 , Conference)We present an overview of Task 5 of the sixth edition of the CheckThat! Lab, which is a part of the 2023 Conference and Labs of the Evaluation Forum (CLEF). In this Authority Finding task, participating systems are required ... -
The CLEF-2023 CheckThat! Lab: Checkworthiness, Subjectivity, Political Bias, Factuality, and Authority
( Springer Science and Business Media Deutschland GmbH , 2023 , Conference)The five editions of the CheckThat! lab so far have focused on the main tasks of the information verification pipeline: check-worthiness, evidence retrieval and pairing, and verification. The 2023 edition of the lab zooms ... -
Detecting Stance of Authorities Towards Rumors in Arabic Tweets: A Preliminary Study
( Springer Science and Business Media Deutschland GmbH , 2023 , Conference)A myriad of studies addressed the problem of rumor verification in Twitter by either utilizing evidence from the propagation networks or external evidence from the Web. However, none of these studies exploited evidence ... -
ArCOV-19: The First Arabic COVID-19 Twitter Dataset with Propagation Networks
( Association for Computational Linguistics (ACL) , 2021 , Conference)In this paper, we present ArCOV-19, an Arabic COVID-19 Twitter dataset that spans one year, covering the period from 27th of January 2020 till 31st of January 2021. ArCOV-19 is the first publicly-available Arabic Twitter ... -
Unsupervised query reduction for efficient yet effective news background linking
( PeerJ Inc. , 2023 , Article)In this article, we study efficient techniques to tackle the news background linking problem, in which an online reader seeks background knowledge about a given article to better understand its context. Recently, this ... -
Are authorities denying or supporting? Detecting stance of authorities towards rumors in Twitter
( Springer , 2024 , Article)Several studies examined the leverage of the stance in conversational threads or news articles as a signal for rumor verification. However, none of these studies leveraged the stance of trusted authorities. In this work, ... -
Who can verify this? Finding authorities for rumor verification in Twitter
( Elsevier , 2023 , Article)A large body of research work has proposed verification techniques for rumors spreading in social media that mainly relied on subjective evidence, e.g., propagation networks or user interactions. Alternatively, in this ... -
Improving conversational search with query reformulation using selective contextual history
( Elsevier , 2023 , Article)Automated responses to questions for conversational agents, known as conversation passage retrieval, is challenging due to omissions and implied context in user queries. To help address this challenge, queries can be ... -
IDRISI-D: Arabic and English Datasets and Benchmarks for Location Mention Disambiguation over Disaster Microblogs
( Association for Computational Linguistics (ACL) , 2023 , Conference)Extracting and disambiguating geolocation information from social media data enables effective disaster management, as it helps response authorities; for example, locating incidents for planning rescue activities and ... -
The CLEF-2024 CheckThat! Lab: Check-Worthiness, Subjectivity, Persuasion, Roles, Authorities, and Adversarial Robustness
( Springer Science and Business Media Deutschland GmbH , 2024 , Conference)The first five editions of the CheckThat! lab focused on the main tasks of the information verification pipeline: check-worthiness, evidence retrieval and pairing, and verification. Since the 2023 edition, it has been ... -
On Accommodating VR Traffic for mHealth Applications in Rural Areas with Limited Impact on IoT Traffic
( Institute of Electrical and Electronics Engineers Inc. (IEEE) , 2020 , Conference)This paper investigates radio resource management for internet of things (IoT) networks with application to bandwidth constrained scenarios, e.g., in rural and under-privileged areas. An algorithm for efficient IoT resource ... -
Quantifying Empathy in Virtual Reality: An Outline
( Institute of Electrical and Electronics Engineers Inc. (IEEE) , 2020 , Conference)The purpose of this paper is to provide an outline of the research undertaken hitherto on quantifying empathy in virtual reality (VR). In this paper we have discussed various methodologies used for testing the impact on ... -
Combating jamming attacks in multi-channel IoT networks using game theory
( Institute of Electrical and Electronics Engineers Inc. (IEEE) , 2020 , Conference)Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ... -
Physical Layer Anti-jamming Technique Using Massive Planar Antenna Arrays
( Institute of Electrical and Electronics Engineers Inc. (IEEE) , 2020 , Conference)Wirelessly connected devices play a vital role in people's daily life, especially with the significant rise in the number of devices connected to the Internet and the huge data being generated everyday. However, the open ... -
IoT Anti-Jamming Strategy Using Game Theory and Neural Network
( Institute of Electrical and Electronics Engineers Inc. (IEEE) , 2020 , Conference)The internet of things (IoT) is one of the most exposed networks to attackers due to its widespread and its heterogeneity. In such networks, jamming attacks are widely used by malicious users to compromise the private and ...














