Sciweavers

375 search results - page 55 / 75
» On ranking techniques for desktop search
Sort
View
ICB
2009
Springer
142views Biometrics» more  ICB 2009»
15 years 4 months ago
Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints
Law enforcement agencies routinely collect both rolled and plain fingerprints of all the ten fingers of suspects. These two types of fingerprints complement each other, since ro...
Jianjiang Feng, Soweon Yoon, Anil K. Jain
EDBT
2010
ACM
132views Database» more  EDBT 2010»
15 years 1 months ago
Turbo-charging hidden database samplers with overflowing queries and skew reduction
Recently, there has been growing interest in random sampling from online hidden databases. These databases reside behind form-like web interfaces which allow users to execute sear...
Arjun Dasgupta, Nan Zhang 0004, Gautam Das
ISMIR
2004
Springer
156views Music» more  ISMIR 2004»
15 years 3 months ago
Artist Classification with Web-Based Data
Manifold approaches exist for organization of music by genre and/or style. In this paper we propose the use of text categorization techniques to classify artists present on the In...
Peter Knees, Elias Pampalk, Gerhard Widmer
74
Voted
TREC
2004
14 years 11 months ago
Using Clustering and Blade Clusters in the Terabyte Task
Web search engines exploit conjunctive queries and special ranking criteria which differ from the disjunctive queries typically used for ad-hoc retrieval. We wanted to asses the e...
Giuseppe Attardi, Andrea Esuli, Chirag Patel
AIRWEB
2009
Springer
15 years 4 months ago
Looking into the past to better classify web spam
Web spamming techniques aim to achieve undeserved rankings in search results. Research has been widely conducted on identifying such spam and neutralizing its influence. However,...
Na Dai, Brian D. Davison, Xiaoguang Qi