Sciweavers

326 search results - page 46 / 66
» Misuse detection for information retrieval systems
Sort
View
91
Voted
ECIR
2004
Springer
15 years 1 months ago
Identification of Relevant and Novel Sentences Using Reference Corpus
In the novelty task on sentence level, the amount of information used in similarity computation is the major challenging issue. A shallow NLP approach extracts noun and verb featu...
Hsin-Hsi Chen, Ming-Feng Tsai, Ming-Hung Hsu
85
Voted
AICCSA
2006
IEEE
90views Hardware» more  AICCSA 2006»
15 years 6 months ago
ICE: A System for Identification of Conflicts in Exams
Although E-learning has advanced considerably in the last decade, some of its aspects, such as E-testing, are still in the development phase. Authoring tools and test banks for E-...
Hicham Hage, Esma Aïmeur
ICMCS
2005
IEEE
153views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Improved semantic region labeling based on scene context
Semantic region labeling in outdoor scenes, e.g., identifying sky, grass, foliage, water, and snow, facilitates content-based image retrieval, organization, and enhancement. A maj...
Matthew R. Boutell, Jiebo Luo, Christopher M. Brow...
110
Voted
AIRWEB
2007
Springer
15 years 6 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
WPES
2006
ACM
15 years 6 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov