Sciweavers

326 search results - page 36 / 66
» Misuse detection for information retrieval systems
Sort
View
CIKM
2005
Springer
15 years 6 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
CIKM
2008
Springer
15 years 2 months ago
Identifying table boundaries in digital documents via sparse line detection
Most prior work on information extraction has focused on extracting information from text in digital documents. However, often, the most important information being reported in an...
Ying Liu, Prasenjit Mitra, C. Lee Giles
MVA
2006
205views Computer Vision» more  MVA 2006»
15 years 11 days ago
Ontological inference for image and video analysis
Abstract This paper presents an approach to designing and implementing extensible computational models for perceiving systems based on a knowledge-driven joint inference approach. ...
Christopher Town
137
Voted
WWW
2011
ACM
14 years 7 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
MM
2010
ACM
146views Multimedia» more  MM 2010»
15 years 19 days ago
Understanding the security and robustness of SIFT
Many content-based retrieval systems (CBIRS) describe images using the SIFT local features because of their very robust recognition capabilities. While SIFT features proved to cop...
Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Ams...