Work with academic experts in theoretical computer science
A scholar or researcher with expertise in theoretical computer science can help business and industrial clients solve their theoretical computer science problems and conduct theoretical computer science research to get ahead on R&D. Experts on NotedSource with backgrounds in theoretical computer science include Suhang Wang, Edoardo Airoldi, Osaye Fadekemi, PhD, Upavan Gupta, Ph.D., Mark Ryan, and Bernd Stahl.
Suhang Wang
Professor at Pennsylvania State University
Most Relevant Research Interests
Other Research Interests (27)
About
Most Relevant Publications (6+)
96 total publications
Feature Selection
ACM Computing Surveys / Dec 06, 2017
Li, J., Cheng, K., Wang, S., Morstatter, F., Trevino, R. P., Tang, J., & Liu, H. (2017). Feature Selection. ACM Computing Surveys, 50(6), 1–45. https://doi.org/10.1145/3136625
A Generative Model for category text generation
Information Sciences / Jun 01, 2018
Li, Y., Pan, Q., Wang, S., Yang, T., & Cambria, E. (2018). A Generative Model for category text generation. Information Sciences, 450, 301–315. https://doi.org/10.1016/j.ins.2018.03.050
Disentangled Variational Auto-Encoder for semi-supervised learning
Information Sciences / May 01, 2019
Li, Y., Pan, Q., Wang, S., Peng, H., Yang, T., & Cambria, E. (2019). Disentangled Variational Auto-Encoder for semi-supervised learning. Information Sciences, 482, 73–85. https://doi.org/10.1016/j.ins.2018.12.057
Random-Forest-Inspired Neural Networks
ACM Transactions on Intelligent Systems and Technology / Oct 29, 2018
Wang, S., Aggarwal, C., & Liu, H. (2018). Random-Forest-Inspired Neural Networks. ACM Transactions on Intelligent Systems and Technology, 9(6), 1–25. https://doi.org/10.1145/3232230
Understanding and Identifying Rhetorical Questions in Social Media
ACM Transactions on Intelligent Systems and Technology / Jan 10, 2018
Ranganath, S., Hu, X., Tang, J., Wang, S., & Liu, H. (2018). Understanding and Identifying Rhetorical Questions in Social Media. ACM Transactions on Intelligent Systems and Technology, 9(2), 1–22. https://doi.org/10.1145/3108364
Semi-supervised anomaly detection in dynamic communication networks
Information Sciences / Sep 01, 2021
Meng, X., Wang, S., Liang, Z., Yao, D., Zhou, J., & Zhang, Y. (2021). Semi-supervised anomaly detection in dynamic communication networks. Information Sciences, 571, 527–542. https://doi.org/10.1016/j.ins.2021.04.056
Edoardo Airoldi
Professor of Statistics & Data Science Temple University & PI, Harvard University
Most Relevant Research Interests
Other Research Interests (63)
About
Most Relevant Publications (1+)
106 total publications
Scalable estimation strategies based on stochastic approximations: classical results and new insights
Statistics and Computing / Jun 11, 2015
Toulis, P., & Airoldi, E. M. (2015). Scalable estimation strategies based on stochastic approximations: classical results and new insights. Statistics and Computing, 25(4), 781–795. https://doi.org/10.1007/s11222-015-9560-y
Osaye Fadekemi, PhD
Assistant Professor of Mathematics at Alabama State University with expertise in Graph Theory and Network Modeling
Most Relevant Research Interests
Other Research Interests (21)
About
Most Relevant Publications (2+)
7 total publications
Average eccentricity,k -packing andk -domination in graphs
Discrete Mathematics / May 01, 2019
Dankelmann, P., & Osaye, F. J. (2019). Average eccentricity,<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" overflow="scroll" id="d1e86" altimg="si36.gif"><mml:mi>k</mml:mi></mml:math>-packing and<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" overflow="scroll" id="d1e91" altimg="si36.gif"><mml:mi>k</mml:mi></mml:math>-domination in graphs. Discrete Mathematics, 342(5), 1261–1274. https://doi.org/10.1016/j.disc.2019.01.004
The average eccentricity of a graph with prescribed girth
Discrete Mathematics / Dec 01, 2022
Osaye, F. J. (2022). The average eccentricity of a graph with prescribed girth. Discrete Mathematics, 345(12), 113066. https://doi.org/10.1016/j.disc.2022.113066
Upavan Gupta, Ph.D.
Analytics Consulting, Data Science, Risk and Prospecting Models, Credit, Mortgage, Property, and Rental Data Expert
Most Relevant Research Interests
Other Research Interests (16)
Most Relevant Publications (1+)
12 total publications
Multievent Crisis Management Using Noncooperative Multistep Games
IEEE Transactions on Computers / May 01, 2007
Gupta, U., & Ranganathan, N. (2007). Multievent Crisis Management Using Noncooperative Multistep Games. IEEE Transactions on Computers, 56(5), 577–589. https://doi.org/10.1109/tc.2007.1023
Mark Ryan
Digital Ethics Researcher at Wageningen Economic Research
Most Relevant Research Interests
Other Research Interests (47)
About
Most Relevant Publications (1+)
40 total publications
In defence of digital contact-tracing: human rights, South Korea and Covid-19
International Journal of Pervasive Computing and Communications / Aug 06, 2020
Ryan, M. (2020). In defence of digital contact-tracing: human rights, South Korea and Covid-19. International Journal of Pervasive Computing and Communications, 16(4), 383–407. https://doi.org/10.1108/ijpcc-07-2020-0081
Bernd Stahl
Director of the Centre for Computing and Social Responsibility
Most Relevant Research Interests
Other Research Interests (70)
Most Relevant Publications (3+)
145 total publications
The Ethics of Computing
ACM Computing Surveys / Feb 22, 2016
Stahl, B. C., Timmermans, J., & Mittelstadt, B. D. (2016). The Ethics of Computing. ACM Computing Surveys, 48(4), 1–38. https://doi.org/10.1145/2871196
Responsible Innovation
ITNOW / Aug 14, 2014
Stahl, B. C., Jirotka, M., Eden, G., Timmermans, J., & Hartswood, M. (2014). Responsible Innovation. ITNOW, 56(3), 20–22. https://doi.org/10.1093/itnow/bwu068
Tomorrow’s ethics and today’s response: An investigation into the ways information systems professionals perceive and address emerging ethical issues
Information Systems Frontiers / Mar 29, 2014
Wakunuma, K. J., & Stahl, B. C. (2014). Tomorrow’s ethics and today’s response: An investigation into the ways information systems professionals perceive and address emerging ethical issues. Information Systems Frontiers, 16(3), 383–397. https://doi.org/10.1007/s10796-014-9490-9