Sciweavers

1757 search results - page 284 / 352
» Secure Content Validation
Sort
View
WSDM
2012
ACM
295views Data Mining» more  WSDM 2012»
13 years 6 months ago
A straw shows which way the wind blows: ranking potentially popular items from early votes
Prediction of popular items in online content sharing systems has recently attracted a lot of attention due to the tremendous need of users and its commercial values. Different fr...
Peifeng Yin, Ping Luo, Min Wang, Wang-Chien Lee
72
Voted
CVPR
2006
IEEE
16 years 1 months ago
Space-Time Video Montage
Conventional video summarization methods focus predominantly on summarizing videos along the time axis, such as building a movie trailer. The resulting video trailer tends to reta...
Hong-Wen Kang, Yasuyuki Matsushita, Xiaoou Tang, X...
WWW
2006
ACM
15 years 12 months ago
Reappraising cognitive styles in adaptive web applications
The mechanisms for personalisation used in web applications are currently the subject of much debate amongst researchers from many diverse subject areas. One of the most contempor...
Adam Moore, Elizabeth J. Brown, Helen Ashman, Tim ...
WWW
2002
ACM
15 years 12 months ago
A machine learning based approach for table detection on the web
Table is a commonly used presentation scheme, especially for describing relational information. However, table understanding remains an open problem. In this paper, we consider th...
Yalin Wang, Jianying Hu
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
15 years 11 months ago
Applying syntactic similarity algorithms for enterprise information management
: ? Applying Syntactic Similarity Algorithms for Enterprise Information Management Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph Tucek, Alistair Veitch HP Laborato...
Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey...