Sciweavers

6318 search results - page 1172 / 1264
» Data Leakage Detection
Sort
View
109
Voted
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
16 years 2 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 2 months ago
Seven pitfalls to avoid when running controlled experiments on the web
Controlled experiments, also called randomized experiments and A/B tests, have had a profound influence on multiple fields, including medicine, agriculture, manufacturing, and adv...
Thomas Crook, Brian Frasca, Ron Kohavi, Roger Long...
107
Voted
KDD
2004
ACM
141views Data Mining» more  KDD 2004»
16 years 2 months ago
A Maximum Entropy Approach to Biomedical Named Entity Recognition
Machine learning approaches are frequently used to solve name entity (NE) recognition (NER). In this paper we propose a hybrid method that uses maximum entropy (ME) as the underly...
Yi-Feng Lin, Tzong-Han Tsai, Wen-Chi Chou, Kuen-Pi...
VLSID
2001
IEEE
164views VLSI» more  VLSID 2001»
16 years 2 months ago
An Efficient Parallel Transparent Bist Method For Multiple Embedded Memory Buffers
In this paper, we propose a new transparent built-in self-test ( TBIST ) method to test multiple embedded memory arrays with various sizes in parallel. First, a new transparent tes...
Der-Cheng Huang, Wen-Ben Jone, Sunil R. Das
CHI
2004
ACM
16 years 2 months ago
Automatic support for web user studies with SCONE and TEA
This paper describes the concepts of TEA, a flexible tool that supports user tests by automating repetitive tasks and collecting data of user inputs and actions. TEA was specifica...
Hartmut Obendorf, Harald Weinreich, Torsten Hass
« Prev « First page 1172 / 1264 Last » Next »