Sciweavers

128 search results - page 26 / 26
» Approaches to automatic lexicon learning with limited traini...
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
13 years 11 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
CSCW
2010
ACM
14 years 2 months ago
Are you having difficulty?
It would be useful if software engineers/instructors could be aware that remote team members/students are having difficulty with their programming tasks. We have developed an appr...
Jason Carter, Prasun Dewan
WWW
2005
ACM
14 years 6 months ago
Web data extraction based on partial tree alignment
This paper studies the problem of extracting data from a Web page that contains several structured data records. The objective is to segment these data records, extract data items...
Yanhong Zhai, Bing Liu