Sciweavers

5170 search results - page 1011 / 1034
» A Document-Oriented Approach to the Development of Knowledge...
Sort
View
93
Voted
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 2 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
119
Voted
WWW
2005
ACM
16 years 2 months ago
Ranking definitions with supervised learning methods
This paper is concerned with the problem of definition search. Specifically, given a term, we are to retrieve definitional excerpts of the term and rank the extracted excerpts acc...
Jun Xu, Yunbo Cao, Hang Li, Min Zhao
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
15 years 8 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...
ATC
2007
Springer
15 years 8 months ago
An Architecture for Self-healing Autonomous Object Groups
Abstract. Jgroup/ARM is a middleware for developing and operating dependable distributed Java applications. Jgroup integrates the distributed object model of Java RMI with the obje...
Hein Meling
147
Voted
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 6 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
« Prev « First page 1011 / 1034 Last » Next »