Sciweavers

CIKM
2009
Springer
13 years 11 months ago
Topic and keyword re-ranking for LDA-based topic modeling
Topic-based text summaries promise to help average users quickly understand a text collection and derive insights. Recent research has shown that the Latent Dirichlet Allocation (...
Yangqiu Song, Shimei Pan, Shixia Liu, Michelle X. ...
CIKM
2009
Springer
13 years 11 months ago
Predicting the volume of comments on online news stories
On-line news agents provide commenting facilities for readers to express their views with regard to news stories. The number of user supplied comments on a news article may be ind...
Manos Tsagkias, Wouter Weerkamp, Maarten de Rijke
CIKM
2009
Springer
13 years 11 months ago
Exploiting bidirectional links: making spamming detection easier
Previous anti-spamming algorithms based on link structure suffer from either the weakness of the page value metric or the vagueness of the seed selection. In this paper, we propos...
Yan Zhang, Qiancheng Jiang, Lei Zhang, Yizhen Zhu
CIKM
2009
Springer
13 years 11 months ago
Enhancing expertise retrieval using community-aware strategies
Expertise retrieval has received increased interests in recent years, whose task is to suggest people with relevant expertise. Motivated by the observation that communities could ...
Hongbo Deng, Irwin King, Michael R. Lyu
CIKM
2009
Springer
13 years 11 months ago
Fragment-based clustering ensembles
Clustering ensembles combine different clustering solutions into a single robust and stable one. Most of existing methods become highly time-consuming when the data size turns to ...
Ou Wu, Mingliang Zhu, Weiming Hu
CIKM
2009
Springer
13 years 11 months ago
Inverted indexes vs. bitmap indexes in decision support systems
Bitmap indexes are widely used in Decision Support Systems (DSSs) to improve query performance. In this paper, we evaluate the use of compressed inverted indexes with adapted quer...
Truls A. Bjørklund, Nils Grimsmo, Johannes ...
CIKM
2009
Springer
13 years 11 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
CIKM
2009
Springer
13 years 11 months ago
LoOP: local outlier probabilities
Many outlier detection methods do not merely provide the decision for a single data object being or not being an outlier but give also an outlier score or “outlier factor” sig...
Hans-Peter Kriegel, Peer Kröger, Erich Schube...
CIKM
2009
Springer
13 years 11 months ago
A query model based on normalized log-likelihood
Leveraging information from relevance assessments has been proposed as an effective means for improving retrieval. We introduce a novel language modeling method which uses inform...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
CIKM
2009
Springer
13 years 11 months ago
Automatic link detection: a sequence labeling approach
The popularity of Wikipedia and other online knowledge bases has recently produced an interest in the machine learning community for the problem of automatic linking. Automatic hy...
James J. Gardner, Li Xiong