Sciweavers

2926 search results - page 489 / 586
» Document Analysis
Sort
View
119
Voted
HT
2009
ACM
15 years 10 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer
146
Voted
PKDD
2009
Springer
118views Data Mining» more  PKDD 2009»
15 years 10 months ago
Protein Identification from Tandem Mass Spectra with Probabilistic Language Modeling
This paper presents an interdisciplinary investigation of statistical information retrieval (IR) techniques for protein identification from tandem mass spectra, a challenging probl...
Yiming Yang, Abhay Harpale, Subramaniam Ganapathy
AIRS
2004
Springer
15 years 7 months ago
Effective Topic Distillation with Key Resource Pre-selection
Topic distillation aims at finding key resources which are high-quality pages for certain topics. With analysis in non-content features of key resources, a pre-selection method is ...
Yiqun Liu, Min Zhang, Shaoping Ma
GRID
2007
Springer
15 years 3 months ago
The Requirements of Using Provenance in e-Science Experiments
In e-Science experiments, it is vital to record the experimental process for later use such as in interpreting results, verifying that the correct process took place or tracing whe...
Simon Miles, Paul T. Groth, Miguel Branco, Luc Mor...
143
Voted
KBSE
2010
IEEE
15 years 2 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes