Filling out document forms distributed by email or hosted on the Web is still problematic and usually requires a printer and scanner. Users commonly download and print forms, fill...
Laurent Denoue, John Adcock, Scott Carter, Patrick...
—A common strategy to assign keywords to documents is to select the most appropriate words from the document text. One of the most important criteria for a word to be selected as...
We present theoretical bounds and empirical robustness of score regularization given changes in the similarity measure. Categories and Subject Descriptors: I.5.3 Clustering: Simil...
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
In this paper, we propose a novel top-k learning to rank framework, which involves labeling strategy, ranking model and evaluation measure. The motivation comes from the difficul...