Skip to main content

Showing 1–4 of 4 results for author: Jones, C L

  1. arXiv:1612.00516  [pdf, other

    stat.ML cs.LG

    Canonical Correlation Analysis for Analyzing Sequences of Medical Billing Codes

    Authors: Corinne L. Jones, Sham M. Kakade, Lucas W. Thornblade, David R. Flum, Abraham D. Flaxman

    Abstract: We propose using canonical correlation analysis (CCA) to generate features from sequences of medical billing codes. Applying this novel use of CCA to a database of medical billing codes for patients with diverticulitis, we first demonstrate that the CCA embeddings capture meaningful relationships among the codes. We then generate features from these embeddings and establish their usefulness in pre… ▽ More

    Submitted 6 January, 2017; v1 submitted 1 December, 2016; originally announced December 2016.

    Comments: Accepted at NIPS 2016 Workshop on Machine Learning for Health

  2. arXiv:1504.04317  [pdf, ps, other

    cs.IR cs.CL cs.CR

    Towards a relation extraction framework for cyber-security concepts

    Authors: Corinne L. Jones, Robert A. Bridges, Kelly Huffer, John Goodall

    Abstract: In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised Natural Language Processing and implement a bootstrapping algorithm for extracting security en… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

    Comments: 4 pages in Cyber & Information Security Research Conference 2015, ACM

    ACM Class: H.3.3

  3. arXiv:1308.4941  [pdf, other

    cs.IR cs.CL

    Automatic Labeling for Entity Extraction in Cyber Security

    Authors: Robert A. Bridges, Corinne L. Jones, Michael D. Iannacone, Kelly M. Testa, John R. Goodall

    Abstract: Timely analysis of cyber-security information necessitates automated information extraction from unstructured text. While state-of-the-art extraction methods produce extremely accurate results, they require ample training data, which is generally unavailable for specialized applications, such as detecting security related entities; moreover, manual annotation of corpora is very costly and often no… ▽ More

    Submitted 9 June, 2014; v1 submitted 22 August, 2013; originally announced August 2013.

    Comments: 10 pages

  4. arXiv:cs/0203015  [pdf

    cs.SD cs.LO

    Towards Experimental Nanosound Using Almost Disjoint Set Theory

    Authors: Cameron L Jones

    Abstract: Music composition using digital audio sequence editors is increasingly performed in a visual workspace where sound complexes are built from discrete sound objects, called gestures that are arranged in time and space to generate a continuous composition. The visual workspace, common to most industry standard audio loop sequencing software, is premised on the arrangement of gestures defined with g… ▽ More

    Submitted 12 March, 2002; originally announced March 2002.

    Comments: 20 pages, 4 figures, 1 table

    ACM Class: H.5.5