Sciweavers

775 search results - page 130 / 155
» Email data cleaning
Sort
View
ECIR
2010
Springer
14 years 8 months ago
Biometric Response as a Source of Query Independent Scoring in Lifelog Retrieval
Personal lifelog archives contain digital records captured from an individual’s daily life, e.g. emails, web pages downloaded and SMSs sent or received. While capturing this info...
Liadh Kelly, Gareth J. F. Jones
IMC
2010
ACM
14 years 7 months ago
A first look at traffic on smartphones
Using data from 43 users across two platforms, we present a detailed look at smartphone traffic. We find that browsing contributes over half of the traffic, while each of email, me...
Hossein Falaki, Dimitrios Lymberopoulos, Ratul Mah...
AIRS
2010
Springer
14 years 7 months ago
Tuning Machine-Learning Algorithms for Battery-Operated Portable Devices
Machine learning algorithms in various forms are now increasingly being used on a variety of portable devices, starting from cell phones to PDAs. They often form a part of standard...
Ziheng Lin, Yan Gu, Samarjit Chakraborty
ML
2010
ACM
135views Machine Learning» more  ML 2010»
14 years 4 months ago
Multi-domain learning by confidence-weighted parameter combination
State-of-the-art statistical NLP systems for a variety of tasks learn from labeled training data that is often domain specific. However, there may be multiple domains or sources o...
Mark Dredze, Alex Kulesza, Koby Crammer
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 1 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...