Sciweavers

690 search results - page 110 / 138
» Cross-lingual keyword assignment
Sort
View
99
Voted
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
15 years 10 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
KDD
2009
ACM
243views Data Mining» more  KDD 2009»
15 years 10 months ago
Exploiting Wikipedia as external knowledge for document clustering
In traditional text clustering methods, documents are represented as "bags of words" without considering the semantic information of each document. For instance, if two ...
Xiaohua Hu, Xiaodan Zhang, Caimei Lu, E. K. Park, ...
87
Voted
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
15 years 10 months ago
Automatic multimedia cross-modal correlation discovery
Given an image (or video clip, or audio song), how do we automatically assign keywords to it? The general problem is to find correlations across the media in a collection of multi...
Jia-Yu Pan, Hyung-Jeong Yang, Christos Faloutsos, ...
KDD
2002
ACM
170views Data Mining» more  KDD 2002»
15 years 10 months ago
Web site mining: a new way to spot competitors, customers and suppliers in the world wide web
When automatically extracting information from the world wide web, most established methods focus on spotting single HTMLdocuments. However, the problem of spotting complete web s...
Martin Ester, Hans-Peter Kriegel, Matthias Schuber...
166
Voted
POPL
2007
ACM
15 years 10 months ago
Preferential path profiling: compactly numbering interesting paths
Path profiles provide a more accurate characterization of a program's dynamic behavior than basic block or edge profiles, but are relatively more expensive to collect. This h...
Kapil Vaswani, Aditya V. Nori, Trishul M. Chilimbi