Sciweavers

326 search results - page 45 / 66
» Misuse detection for information retrieval systems
Sort
View
109
Voted
CIKM
2010
Springer
14 years 11 months ago
Learning to rank relevant and novel documents through user feedback
We consider the problem of learning to rank relevant and novel documents so as to directly maximize a performance metric called Expected Global Utility (EGU), which has several de...
Abhimanyu Lad, Yiming Yang
144
Voted
SIGIR
2012
ACM
13 years 2 months ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...
63
Voted
CAISE
2009
Springer
15 years 7 months ago
Measuring and Comparing Effectiveness of Data Quality Techniques
Abstract. Poor quality data may be detected and corrected by performing various quality assurance activities that rely on techniques with different efficacy and cost. In this pape...
Lei Jiang, Daniele Barone, Alexander Borgida, John...
INFOCOM
2012
IEEE
13 years 2 months ago
Sherlock is around: Detecting network failures with local evidence fusion
—Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct central...
Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu
JIPS
2006
59views more  JIPS 2006»
15 years 10 days ago
A Light-weight and Dynamically Reconfigurable RMON Agent System
: A RMON agent system, which locates on a subnet, collects the network traffic information for management by retrieving and analyzing all of the packets on the subnet. The RMON age...
Jun-Hyung Lee, Zinwon Park, Myung-Kyun Kim