Sciweavers

326 search results - page 58 / 66
» Misuse detection for information retrieval systems
Sort
View
CVPR
2008
IEEE
16 years 2 months ago
Beyond sliding windows: Object localization by efficient subwindow search
Most successful object recognition systems rely on binary classification, deciding only if an object is present or not, but not providing information on the actual object location...
Christoph H. Lampert, Matthew B. Blaschko, Thomas ...
WWW
2010
ACM
15 years 7 months ago
Pusic: musicalize microblog messages for summarization and exploration
Micro-blogging services provide platforms for users to share their feelings and ideas on the go. Desiging to produce information stream in almost micro-blogging services, although...
Cheng-Te Li, Hung-Che Lai, Chien-Tung Ho, Chien-Li...
103
Voted
WWW
2005
ACM
16 years 1 months ago
Extracting context to improve accuracy for HTML content extraction
Web pages contain clutter (such as ads, unnecessary images and extraneous links) around the body of an article, which distracts a user from actual content. Extraction of "use...
Suhit Gupta, Gail E. Kaiser, Salvatore J. Stolfo
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
16 years 26 days ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang
104
Voted
WWW
2006
ACM
16 years 1 months ago
Retroactive answering of search queries
Major search engines currently use the history of a user's actions (e.g., queries, clicks) to personalize search results. In this paper, we present a new personalized service...
Beverly Yang, Glen Jeh