Sciweavers

2926 search results - page 364 / 586
» Document Analysis
Sort
View
209
Voted
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
15 years 11 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.
SIGIR
2004
ACM
15 years 10 months ago
Length normalization in XML retrieval
XML retrieval is a departure from standard document retrieval in which each individual XML element, ranging from italicized words or phrases to full blown articles, is a potential...
Jaap Kamps, Maarten de Rijke, Börkur Sigurbj&...
CLEF
2010
Springer
15 years 5 months ago
External Plagiarism Detection: N-Gram Approach Using Named Entity Recognizer - Lab Report for PAN at CLEF 2010
We tried Named Entity features of source documents to identify its suspicious counter part. A three stage identification method was adopted to understand the impact of NEs in plagi...
Parth Gupta, Sameer Rao, Prasenjit Majumder
121
Voted
BIS
2006
106views Business» more  BIS 2006»
15 years 6 months ago
Expected Utility of Content Blocks in Web Content Extraction
In this paper we discuss the possible application of new concepts in web content extraction: utility assessment, utility annealing, and dynamic aggregated document generation. Aft...
Marek Kowalkiewicz
JCDL
2004
ACM
128views Education» more  JCDL 2004»
15 years 10 months ago
Panorama: extending digital libraries with topical crawlers
A large amount of research, technical and professional documents are available today in digital formats. Digital libraries are created to facilitate search and retrieval of inform...
Gautam Pant, Kostas Tsioutsiouliklis, Judy Johnson...