Sciweavers

944 search results - page 153 / 189
» Evaluating Ontology Cleaning
Sort
View
CHI
2009
ACM
16 years 12 days ago
It's not that important: demoting personal information of low subjective importance using GrayArea
Users find it hard to delete unimportant personal information which often results in cluttered workspaces. We present a full design cycle for GrayArea, a novel interface that allo...
Ofer Bergman, Simon Tucker, Ruth Beyth-Marom, Edwa...
SIGMOD
2009
ACM
155views Database» more  SIGMOD 2009»
16 years 2 days ago
Efficient top-k algorithms for fuzzy search in string collections
An approximate search query on a collection of strings finds those strings in the collection that are similar to a given query string, where similarity is defined using a given si...
Rares Vernica, Chen Li
ICDE
2010
IEEE
801views Database» more  ICDE 2010»
15 years 11 months ago
The Similarity Join Database Operator
Similarity joins have been studied as key operations in multiple application domains, e.g., record linkage, data cleaning, multimedia and video applications, and phenomena detectio...
Mohamed H. Ali, Walid G. Aref, Yasin N. Silva
ACSAC
2009
IEEE
15 years 6 months ago
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis
—Malicious software is rampant on the Internet and costs billions of dollars each year. Safe and thorough analysis of malware is key to protecting vulnerable systems and cleaning...
Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha...
CIKM
2009
Springer
15 years 6 months ago
Reducing the risk of query expansion via robust constrained optimization
We introduce a new theoretical derivation, evaluation methods, and extensive empirical analysis for an automatic query expansion framework in which model estimation is cast as a r...
Kevyn Collins-Thompson