Sciweavers

8706 search results - page 1622 / 1742
» Learning Subjective Language
Sort
View
138
Voted
COMPGEOM
2010
ACM
15 years 7 months ago
Manifold reconstruction using tangential Delaunay complexes
We give a provably correct algorithm to reconstruct a kdimensional manifold embedded in d-dimensional Euclidean space. Input to our algorithm is a point sample coming from an unkn...
Jean-Daniel Boissonnat, Arijit Ghosh
128
Voted
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 7 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
168
Voted
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
15 years 7 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
SIGIR
2010
ACM
15 years 7 months ago
Extending average precision to graded relevance judgments
Evaluation metrics play a critical role both in the context of comparative evaluation of the performance of retrieval systems and in the context of learning-to-rank (LTR) as objec...
Stephen E. Robertson, Evangelos Kanoulas, Emine Yi...
151
Voted
SIGIR
2010
ACM
15 years 7 months ago
Effective music tagging through advanced statistical modeling
Music information retrieval (MIR) holds great promise as a technology for managing large music archives. One of the key components of MIR that has been actively researched into is...
Jialie Shen, Wang Meng, Shuichang Yan, HweeHwa Pan...
« Prev « First page 1622 / 1742 Last » Next »