Sciweavers

1419 search results - page 171 / 284
» Analysis of Summarization Evaluation Experiments
Sort
View
DRM
2008
Springer
14 years 11 months ago
A decision theoretic framework for analyzing binary hash-based content identification systems
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
Avinash L. Varna, Ashwin Swaminathan, Min Wu
CLEF
2010
Springer
14 years 11 months ago
Language Identification Strategies for Cross Language Information Retrieval
In our participation to the 2010 LogCLEF track we focused on the analysis of the European Library (TEL) logs and in particular we experimented with the identification of the natura...
Alessio Bosca, Luca Dini
DSN
2007
IEEE
15 years 4 months ago
Robustness and Security Hardening of COTS Software Libraries
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and s...
Martin Süßkraut, Christof Fetzer
WAIM
2001
Springer
15 years 2 months ago
Link Based Clustering of Web Search Results
Abstract. With information proliferation on the Web, how to obtain highquality information from the Web has been one of hot research topics in many fields like Database, IR as well...
Yitong Wang, Masaru Kitsuregawa
CAIP
2011
Springer
248views Image Analysis» more  CAIP 2011»
13 years 10 months ago
Statistical Tuning of Adaptive-Weight Depth Map Algorithm
Abstract. In depth map generation, the settings of the algorithm parameters to yield an accurate disparity estimation are usually chosen empirically or based on unplanned experimen...
Alejandro Hoyos, John Congote, Iñigo Barand...