Sciweavers

6240 search results - page 1048 / 1248
» From Internet Information Searching to Information Summarizi...
Sort
View
P2P
2006
IEEE
229views Communications» more  P2P 2006»
15 years 8 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
DOCENG
2006
ACM
15 years 8 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
IUI
2006
ACM
15 years 8 months ago
Towards intelligent QA interfaces: discourse processing for context questions
Question answering (QA) systems take users’ natural language questions and retrieve relevant answers from large repositories of free texts. Despite recent progress in QA researc...
Mingyu Sun, Joyce Y. Chai
MM
2006
ACM
152views Multimedia» more  MM 2006»
15 years 8 months ago
Local image representations using pruned salient points with applications to CBIR
Salient points are locations in an image where there is a significant variation with respect to a chosen image feature. Since the set of salient points in an image capture import...
Hui Zhang, Rouhollah Rahmani, Sharath R. Cholleti,...
VIZSEC
2005
Springer
15 years 7 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
« Prev « First page 1048 / 1248 Last » Next »