Sciweavers

ICAIL
2007
ACM
13 years 8 months ago
Opinion mining in legal blogs
We perform a survey into the scope and utility of opinion mining in legal Weblogs (a.k.a. blawgs). The number of `blogs' in the legal domain is growing at a rapid pace and ma...
Jack G. Conrad, Frank Schilder
WIKIS
2010
ACM
13 years 8 months ago
WikiPics: multilingual image search based on Wiki-mining
This demonstration introduces WikiPics, a language-independent image search engine for Wikimedia Commons. Based on the multilingual thesaurus provided by WikiWord, WikiPics allows...
Daniel Kinzler
C3S2E
2009
ACM
13 years 8 months ago
The promise of solid state disks: increasing efficiency and reducing cost of DBMS processing
Most database systems (DBMSs) today are operating on servers equipped with magnetic disks. In our contribution, we want to motivate the use of two emerging and striking technologi...
Karsten Schmidt 0002, Yi Ou, Theo Härder
RECSYS
2009
ACM
13 years 9 months ago
Matching information content with music
This work addresses a particular kind of cross domain personalization task consisting of selecting simultaneously two items in two different domains and recommending them togethe...
Marius Kaminskas
CLOUD
2010
ACM
13 years 9 months ago
A self-organized, fault-tolerant and scalable replication scheme for cloud storage
Failures of any type are common in current datacenters, partly due to the higher scales of the data stored. As data scales up, its availability becomes more complex, while differe...
Nicolas Bonvin, Thanasis G. Papaioannou, Karl Aber...
KDD
2004
ACM
145views Data Mining» more  KDD 2004»
13 years 10 months ago
A graph-theoretic approach to extract storylines from search results
We present a graph-theoretic approach to discover storylines from search results. Storylines are windows that offer glimpses into interesting themes latent among the top search re...
Ravi Kumar, Uma Mahadevan, D. Sivakumar
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
13 years 10 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
CIKM
2004
Springer
13 years 10 months ago
Grammar-based task analysis of web logs
The daily use of Internet-based services is involved with hundreds of different tasks being performed by multiple users. A single task is typically involved with a sequence of Web...
Savitha Srinivasan, Arnon Amir, Prasad M. Deshpand...
WIDM
2005
ACM
13 years 10 months ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...
WIDM
2006
ACM
13 years 10 months ago
Lazy preservation: reconstructing websites by crawling the crawlers
Backup of websites is often not considered until after a catastrophic event has occurred to either the website or its webmaster. We introduce “lazy preservation” – digital p...
Frank McCown, Joan A. Smith, Michael L. Nelson