Sciweavers

2269 search results - page 423 / 454
» Retrieval evaluation with incomplete information
Sort
View
CIKM
2005
Springer
15 years 7 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
ISI
2005
Springer
15 years 7 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
ACMICEC
2004
ACM
171views ECommerce» more  ACMICEC 2004»
15 years 7 months ago
Efficient integration of web services with distributed data flow and active mediation
This paper presents a loosely coupled service-composition paradigm. This paradigm employs a distributed data flow that differs markedly from centralized information flow adopted b...
David Liu, Jun Peng, Kincho H. Law, Gio Wiederhold
MIR
2010
ACM
255views Multimedia» more  MIR 2010»
15 years 7 months ago
Sharing of baseball event through social media
As real-time broadcasting services are becoming more popular, many people are sharing live events with remote users. Despite the success of real-time broadcasting services, a numb...
Hogun Park, Sun-Bum Youn, Eugene Hong, Changhyeon ...
116
Voted
SIGIR
2008
ACM
15 years 1 months ago
Efficient top-k querying over social-tagging networks
Online communities have become popular for publishing and searching content, as well as for finding and connecting to other users. User-generated content includes, for example, pe...
Ralf Schenkel, Tom Crecelius, Mouna Kacimi, Sebast...