no code implementations • 1 Dec 2016 • Corinne L. Jones, Sham M. Kakade, Lucas W. Thornblade, David R. Flum, Abraham D. Flaxman
We propose using canonical correlation analysis (CCA) to generate features from sequences of medical billing codes.
1 code implementation • 16 Apr 2015 • Corinne L. Jones, Robert A. Bridges, Kelly Huffer, John Goodall
In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed.
3 code implementations • 22 Aug 2013 • Robert A. Bridges, Corinne L. Jones, Michael D. Iannacone, Kelly M. Testa, John R. Goodall
Timely analysis of cyber-security information necessitates automated information extraction from unstructured text.