Sciweavers

326 search results - page 51 / 66
» Misuse detection for information retrieval systems
Sort
View
79
Voted
ECCV
2006
Springer
15 years 4 months ago
3-D Ultrasound Probe Calibration for Computer-Guided Diagnosis and Therapy
Abstract. With the emergence of swept-volume ultrasound (US) probes, precise and almost real-time US volume imaging has become available. This offers many new opportunities for com...
Michael Baumann, Vincent Daanen, Antoine Leroy, Jo...
KESAMSTA
2009
Springer
15 years 5 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
114
Voted
ICAIL
2007
ACM
15 years 4 months ago
Essential deduplication functions for transactional databases in law firms
As massive document repositories and knowledge management systems continue to expand, in proprietary environments as well as on the Web, the need for duplicate detection becomes i...
Jack G. Conrad, Edward L. Raymond
89
Voted
IUI
2010
ACM
15 years 7 months ago
DocuBrowse: faceted searching, browsing, and recommendations in an enterprise context
Browsing and searching for documents in large, online enterprise document repositories are common activities. While internet search produces satisfying results for most user queri...
Andreas Girgensohn, Frank M. Shipman III, Francine...
ICWSM
2010
15 years 1 months ago
TweetMotif: Exploratory Search and Topic Summarization for Twitter
We present TweetMotif, an exploratory search application for Twitter. Unlike traditional approaches to information retrieval, which present a simple list of messages, TweetMotif g...
Brendan O'Connor, Michel Krieger, David Ahn