Sciweavers

7596 search results - page 1395 / 1520
» Challenges in forensic computing
Sort
View
WWW
2009
ACM
16 years 4 months ago
Click chain model in web search
Given a terabyte click log, can we build an efficient and effective click model? It is commonly believed that web search click logs are a gold mine for search business, because th...
Anitha Kannan, Chao Liu 0001, Christos Faloutsos, ...
122
Voted
WWW
2008
ACM
16 years 4 months ago
Sewnet -: a framework for creating services utilizing telecom functionality
With Telecom market reaching saturation in many geographies and revenues from voice calls decreasing, Telecom operators are trying to identify new sources of revenue. For this pur...
Sumit Mittal, Dipanjan Chakraborty, Sunil Goyal, S...
144
Voted
WWW
2008
ACM
16 years 4 months ago
WWW 2008 workshop: NLPIX2008 summary
The amount of information available on the Web has increased rapidly, reaching levels that few would ever have imagined possible. We live in what could be called the "informa...
Hiroshi Nakagawa, Kentaro Torisawa, Marasu Kitsure...
179
Voted
WWW
2008
ACM
16 years 4 months ago
Detecting image spam using visual features and near duplicate detection
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...
Bhaskar Mehta, Saurabh Nangia, Manish Gupta 0002, ...
143
Voted
WWW
2007
ACM
16 years 4 months ago
BOWiki - a Collaborative Annotation and Ontology Curation Framework
As the amount of data being generated in biology has increased, a major challenge has been how to store and represent this data in a way that makes it easily accessible to researc...
Michael Backhaus, Janet Kelso, Joshua Bacher, Hein...
« Prev « First page 1395 / 1520 Last » Next »