Sciweavers

375 search results - page 53 / 75
» On ranking techniques for desktop search
Sort
View
HT
2009
ACM
14 years 7 months ago
Retrieving broken web links using an approach based on contextual information
In this short note we present a recommendation system for automatic retrieval of broken Web links using an approach based on contextual information. We extract information from th...
Juan Martinez-Romo, Lourdes Araujo
AIRWEB
2005
Springer
15 years 3 months ago
Cloaking and Redirection: A Preliminary Study
Cloaking and redirection are two possible search engine spamming techniques. In order to understand cloaking and redirection on the Web, we downloaded two sets of Web pages while ...
Baoning Wu, Brian D. Davison
ICCD
1999
IEEE
130views Hardware» more  ICCD 1999»
15 years 2 months ago
Preference-Driven Hierarchical Hardware/Software Partitioning
In this paper, we present a hierarchical evolutionary approach to hardware/software partitioning for real-time embedded systems. In contrast to most of previous approaches, we app...
Gang Quan, Xiaobo Hu, Garrison W. Greenwood
ICIP
1998
IEEE
15 years 11 months ago
Generalized Distance based Matching of Nonbinary Images
We develope a technique to perform e cient and accurate matching to detect the occurences of a template in a scene. The template may describe an object or a textured surface. Repr...
Bülent Sankur, Cenk Köse, Valery V. Star...
77
Voted
SSD
2007
Springer
124views Database» more  SSD 2007»
15 years 3 months ago
Querying Objects Modeled by Arbitrary Probability Distributions
In many modern applications such as biometric identification systems, sensor networks, medical imaging, geology, and multimedia databases, the data objects are not described exact...
Christian Böhm, Peter Kunath, Alexey Pryakhin...