Sciweavers

6660 search results - page 1083 / 1332
» Data Analysis for Query Processing
Sort
View
152
Voted
WWW
2003
ACM
15 years 8 months ago
User Access Pattern Enhanced Small Web Search
Current search engines generally employ link analysis techniques to web-page re-ranking. However, the same techniques are problematic in small webs, such as websites or intranet w...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...
ECHT
1992
15 years 7 months ago
Two Years before the Mist: Experiences with Aquanet
Aquanet is a collaborative hypertext tool that combines elements of frame-based knowledge representation and graphical presentation. In this paper, we examine the first major appl...
Catherine C. Marshall, Russell A. Rogers
156
Voted
ACMACE
2007
ACM
15 years 7 months ago
Application of dimensionality reduction techniques to HRTFS for interactive virtual environments
Fundamental to the generation of 3D audio is the HRTF processing of acoustical signals. Unfortunately, given the high dimensionality of HRTFs, incorporating them into dynamic/inte...
Bill Kapralos, Nathan Mekuz
125
Voted
CSMR
2004
IEEE
15 years 7 months ago
Source Code Modularization Using Lattice of Concept Slices
Most legacy systems have been altered due to prolonged maintenance to the point that they deviate significantly from their original and intended design and consequently, they lack...
Raihan Al-Ekram, Kostas Kontogiannis
118
Voted
AAAI
2008
15 years 6 months ago
Proactive Intrusion Detection
Machine learning systems are deployed in many adversarial conditions like intrusion detection, where a classifier has to decide whether a sequence of actions come from a legitimat...
Benjamin Liebald, Dan Roth, Neelay Shah, Vivek Sri...
« Prev « First page 1083 / 1332 Last » Next »