Sciweavers

661 search results - page 39 / 133
» Combining Information using Hard Constraints
Sort
View
ISSRE
2010
IEEE
14 years 8 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
86
Voted
IMC
2006
ACM
15 years 4 months ago
Towards IP geolocation using delay and topology measurements
We present Topology-based Geolocation (TBG), a novel approach to estimating the geographic location of arbitrary Internet hosts. We motivate our work by showing that 1) existing a...
Ethan Katz-Bassett, John P. John, Arvind Krishnamu...
111
Voted
AND
2010
14 years 7 months ago
Statement map: reducing web information credibility noise through opinion classification
On the Internet, users often encounter noise in the form of spelling errors or unknown words, however, dishonest, unreliable, or biased information also acts as noise that makes i...
Koji Murakami, Eric Nichols, Junta Mizuno, Yotaro ...
107
Voted
KDD
2012
ACM
229views Data Mining» more  KDD 2012»
13 years 20 days ago
Finding trendsetters in information networks
Influential people have an important role in the process of information diffusion. However, there are several ways to be influential, for example, to be the most popular or the...
Diego Sáez-Trumper, Giovanni Comarela, Virg...
SIGIR
2009
ACM
15 years 4 months ago
Positional language models for information retrieval
Although many variants of language models have been proposed for information retrieval, there are two related retrieval heuristics remaining “external” to the language modelin...
Yuanhua Lv, ChengXiang Zhai