Sciweavers

1663 search results - page 307 / 333
» Computer Security in the Real World
Sort
View
103
Voted
CLEF
2010
Springer
15 years 3 months ago
Bootstrapping Websites for Classification of Organization Names on Twitter
There has been a growing interest in monitoring the social media presence of companies for improved marketing. Many public APIs are available for tapping into the data, and there a...
Paul Kalmar
DATAMINE
2007
110views more  DATAMINE 2007»
15 years 1 months ago
The complexity of non-hierarchical clustering with instance and cluster level constraints
Recent work has looked at extending clustering algorithms with instance level must-link (ML) and cannot-link (CL) background information. Our work introduces δ and ǫ cluster lev...
Ian Davidson, S. S. Ravi
SIGIR
2008
ACM
15 years 1 months ago
Named entity normalization in user generated content
Named entity recognition is important for semantically oriented retrieval tasks, such as question answering, entity retrieval, biomedical retrieval, trend detection, and event and...
Valentin Jijkoun, Mahboob Alam Khalid, Maarten Mar...
INFORMS
1998
150views more  INFORMS 1998»
15 years 1 months ago
Branch and Infer: A Unifying Framework for Integer and Finite Domain Constraint Programming
constraint abstractions into integer programming, and to discuss possible combinations of the two approaches. Combinatorial problems are ubiquitous in many real world applications ...
Alexander Bockmayr, Thomas Kasper
CORR
2010
Springer
120views Education» more  CORR 2010»
15 years 1 months ago
Modeling of 2D and 3D Assemblies Taking Into Account Form Errors of Plane Surfaces
The tolerancing process links the virtual and the real worlds. From the former, tolerances define a variational geometrical language (geometric parameters). From the latter, there...
Serge Samper, Pierre-Antoine Adragna, Hugues Favre...