Sciweavers

1248 search results - page 169 / 250
» Comparable Entity Mining from Comparative Questions
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 9 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
126
Voted
GIR
2007
ACM
15 years 7 months ago
Geo-tagging for imprecise regions of different sizes
Extracting geographical information from various web sources is likely to be important for a variety of applications. One such use for this information is to enable the study of v...
Robert Pasley, Paul Clough, Mark Sanderson
129
Voted
LWA
2007
15 years 4 months ago
The Effectiveness of Concept Based Search for Video Retrieval
In this paper we investigate how a small number of high-level concepts derived for video shots, such as Sports, Face, Indoor, etc., can be used effectively for ad hoc search in vi...
Claudia Hauff, Robin Aly, Djoerd Hiemstra
137
Voted
CHI
2010
ACM
15 years 10 months ago
Gender demographic targeting in sponsored search
In this research, we evaluate the effect of gender in analyzing the performance of sponsored search advertising. We examine a log file with data comprised of nearly 7,000,000 reco...
Bernard J. Jansen, Lauren Solomon
SASO
2007
IEEE
15 years 9 months ago
Self-organizing Replica Placement - A Case Study on Emergence
The concept of self-organization is rapidly gaining importance in the area of distributed computing systems. However, we still lack the necessary means for engineering such system...
Klaus Herrmann