Sciweavers

43 search results - page 8 / 9
» jasis 2008
Sort
View
JASIS
2008
102views more  JASIS 2008»
13 years 5 months ago
Hierarchical summarization of large documents
mation science has shown that human abstractors extract sentences for summaries based on the hierarchical structure of documents; however, the existing automatic summarization mode...
Christopher C. Yang, Fu Lee Wang
JASIS
2008
94views more  JASIS 2008»
13 years 5 months ago
Toward a theory of network gatekeeping: A framework for exploring information control
Gatekeeping theories have been a popular heuristic for describing information control for years, but none have attained a full theoretical status in the context of networks. This ...
Karine Barzilai-Nahon
JASIS
2008
76views more  JASIS 2008»
13 years 5 months ago
Using importance flooding to identify interesting networks of criminal activity
Abstract. In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice informat...
Byron Marshall, Hsinchun Chen, Siddharth Kaza
JASIS
2008
121views more  JASIS 2008»
13 years 5 months ago
Experiments with transitive dictionary translation and pseudo-relevance feedback using graded relevance assessments
Research on cross-language information retrieval (CLIR) has typically been restricted to settings using binary relevance assessments. In this paper, we present evaluation results f...
Raija Lehtokangas, Heikki Keskustalo, Kalervo J&au...
JASIS
2008
77views more  JASIS 2008»
13 years 5 months ago
Citers' use of citees' names: Findings from a qualitative interview-based study
This article focuses on why academic writers in computer science and sociology sometimes supply the reader with more details of citees' names than they need to: why citers na...
Nigel Harwood