Sciweavers

6240 search results - page 1106 / 1248
» From Internet Information Searching to Information Summarizi...
Sort
View
103
Voted
PAKDD
2009
ACM
120views Data Mining» more  PAKDD 2009»
15 years 11 months ago
Detecting Link Hijacking by Web Spammers.
Abstract. Since current search engines employ link-based ranking algorithms as an important tool to decide a ranking of sites, Web spammers are making a significant effort to man...
Masaru Kitsuregawa, Masashi Toyoda, Young-joo Chun...
EUROMICRO
2007
IEEE
15 years 8 months ago
Partial Verification of Software Components: Heuristics for Environment Construction
Code model checking of software components suffers from the well-known problem of state explosion when applied to highly parallel components, despite the fact that a single compon...
Pavel Parizek, Frantisek Plasil
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
15 years 7 months ago
Expanding Citizen Access and Public Official Accountability through Knowledge Creation Technology: One Recent Development in e-D
The authors describe an addition to the conversation regarding enhanced democracy through technologicallyassisted means (e-Democracy) focusing on enhancing and expanding the typic...
Michael A. Shires, Murray S. Craig
108
Voted
GECCO
1999
Springer
15 years 6 months ago
An Immune System Approach to Scheduling in Changing Environments
This paper describes the application of an arti cial immune system, AIS, model to a scheduling application, in which sudden changes in the scheduling environment require the rap...
Emma Hart, Peter Ross
KDD
1998
ACM
145views Data Mining» more  KDD 1998»
15 years 6 months ago
Coincidence Detection: A Fast Method for Discovering Higher-Order Correlations in Multidimensional Data
Wepresent a novel, fast methodfor associationminingill high-dimensionaldatasets. OurCoincidence Detection method, which combines random sampling and Chernoff-Hoeffding bounds with...
Evan W. Steeg, Derek A. Robinson, Ed Willis
« Prev « First page 1106 / 1248 Last » Next »