Sciweavers

3693 search results - page 191 / 739
» Network Processing of Documents, for Documents, by Documents
Sort
View
SIGIR
2006
ACM
15 years 5 months ago
Near-duplicate detection by instance-level constrained clustering
For the task of near-duplicated document detection, both traditional fingerprinting techniques used in database community and bag-of-word comparison approaches used in information...
Hui Yang, James P. Callan
PKDD
1998
Springer
113views Data Mining» more  PKDD 1998»
15 years 4 months ago
Text Mining at the Term Level
Knowledge Discovery in Databases (KDD) focuses on the computerized exploration of large amounts of data and on the discovery of interesting patterns within them. While most work on...
Ronen Feldman, Moshe Fresko, Yakkov Kinar, Yehuda ...
DAS
2006
Springer
15 years 3 months ago
Finding the Best-Fit Bounding-Boxes
The bounding-box of a geometric shape in 2D is the rectangle with the smallest area in a given orientation (usually upright) that complete contains the shape. The best-fit bounding...
Bo Yuan, Leong Kwoh, Chew Lim Tan
JASIS
2006
120views more  JASIS 2006»
14 years 11 months ago
Building a reusable test collection for question answering
In contrast to traditional information retrieval systems, which return ranked lists of documents that users must manually browse through, a question answering system attempts to d...
Jimmy J. Lin, Boris Katz
SIGIR
2008
ACM
14 years 11 months ago
Latent dirichlet allocation based multi-document summarization
Extraction based Multi-Document Summarization Algorithms consist of choosing sentences from the documents using some weighting mechanism and combining them into a summary. In this...
Rachit Arora, Balaraman Ravindran