Sciweavers

5580 search results - page 868 / 1116
» Meta-level Information Extraction
Sort
View
146
Voted
CIKM
2008
Springer
15 years 7 months ago
Creating tag hierarchies for effective navigation in social media
In social media, such as blogs, since the content naturally evolves over time, it is hard or in many cases impossible to organize the content for effective navigation. Thus, one c...
K. Selçuk Candan, Luigi Di Caro, Maria Luis...
145
Voted
CIKM
2008
Springer
15 years 7 months ago
Large-scale, parallel automatic patent annotation
When researching new product ideas or filing new patents, inventors need to retrieve all relevant pre-existing know-how and/or to exploit and enforce patents in their technologica...
Milan Agatonovic, Niraj Aswani, Kalina Bontcheva, ...
ECLIPSE
2005
ACM
15 years 7 months ago
Bridging the gap between technical and social dependencies with Ariadne
One of the reasons why large-scale software development is difficult is the number of dependencies that software engineers need to face: e.g., dependencies among the software comp...
Erik Trainer, Stephen Quirk, Cleidson R. B. de Sou...
USS
2004
15 years 6 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
IJCAI
1989
15 years 6 months ago
Chromatic Stereopsis
It is well known that chromatic information can assist in solving the stereo correspondence problem. It has also been suggested that there are two independent first-order stereop...
John R. Jordan III, Alan C. Bovik, Wilson S. Geisl...