Sciweavers

776 search results - page 83 / 156
» Conceptual Patterns for Reuse in Information Systems Analysi...
Sort
View
92
Voted
WWW
2009
ACM
16 years 1 months ago
Competitive analysis from click-through log
Existing keyword suggestion tools from various search engine companies could automatically suggest keywords related to the advertisers' products or services, counting in simp...
Gang Wang, Jian Hu, Yunzhang Zhu, Hua Li, Zheng Ch...
SIGIR
2010
ACM
15 years 4 months ago
Understanding web browsing behaviors through Weibull analysis of dwell time
Dwell time on Web pages has been extensively used for various information retrieval tasks. However, some basic yet important questions have not been sufficiently addressed, e.g., ...
Chao Liu, Ryen W. White, Susan T. Dumais
SCIA
2005
Springer
211views Image Analysis» more  SCIA 2005»
15 years 6 months ago
Perception-Action Based Object Detection from Local Descriptor Combination and Reinforcement Learning
This work proposes to learn visual encodings of attention patterns that enables sequential attention for object detection in real world environments. The system embeds a saccadic d...
Lucas Paletta, Gerald Fritz, Christin Seifert
93
Voted
DGO
2003
140views Education» more  DGO 2003»
15 years 2 months ago
Social Welfare Program Administration and Evaluation and Policy Analysis Using Knowledge Discovery and Data Mining (KDD) on Admi
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...
99
Voted
ACSAC
2007
IEEE
15 years 7 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves