Sciweavers

2309 search results - page 331 / 462
» Patterns for Technology Companies
Sort
View
KES
2008
Springer
15 years 4 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
RITA
2006
302views more  RITA 2006»
15 years 4 months ago
Content-Based Image Retrieval: Theory and Applications
: Advances in data storage and image acquisition technologies have enabled the creation of large image datasets. In this scenario, it is necessary to develop appropriate informatio...
Ricardo da Silva Torres, Alexandre X. Falcã...
SIGIR
2008
ACM
15 years 4 months ago
A comparative evaluation of different link types on enhancing document clustering
With a growing number of works utilizing link information in enhancing document clustering, it becomes necessary to make a comparative evaluation of the impacts of different link ...
Xiaodan Zhang, Xiaohua Hu, Xiaohua Zhou
SIGIR
2008
ACM
15 years 4 months ago
To personalize or not to personalize: modeling queries with variation in user intent
In most previous work on personalized search algorithms, the results for all queries are personalized in the same manner. However, as we show in this paper, there is a lot of vari...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling
SIGIR
2008
ACM
15 years 4 months ago
Classifiers without borders: incorporating fielded text from neighboring web pages
Accurate web page classification often depends crucially on information gained from neighboring pages in the local web graph. Prior work has exploited the class labels of nearby p...
Xiaoguang Qi, Brian D. Davison