Sciweavers

3210 search results - page 537 / 642
» Secure Similarity Search
Sort
View
CLEF
2010
Springer
15 years 6 months ago
Building Strategies, a Year Later
Abstract. After participating in last year's CLEF IP (2009) evaluation benchmark, our scores were rather low. The CLEF IP 2010 PAC task enabled us to correct some experiments ...
Wouter Alink, Roberto Cornacchia, Arjen P. de Vrie...
ECWEB
2010
Springer
219views ECommerce» more  ECWEB 2010»
15 years 6 months ago
Semantic Tag Cloud Generation via DBpedia
Abstract. Many current recommender systems exploit textual annotations (tags) provided by users to retrieve and suggest online contents. The text-based recommendation provided by t...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...
FSKD
2008
Springer
119views Fuzzy Logic» more  FSKD 2008»
15 years 6 months ago
An Entropy Decision Model for Selection of QoS-Aware Services Provisioning
Evaluating web services provisioning is able to reduce redundancy in search and also generates advantages to service providers who deliver valuable services. However, there exist ...
Ping Wang
GECCO
2008
Springer
158views Optimization» more  GECCO 2008»
15 years 6 months ago
Objective reduction using a feature selection technique
This paper introduces two new algorithms to reduce the number of objectives in a multiobjective problem by identifying the most conflicting objectives. The proposed algorithms ar...
Antonio López Jaimes, Carlos A. Coello Coel...
GECCO
2008
Springer
111views Optimization» more  GECCO 2008»
15 years 6 months ago
Multi-task code reuse in genetic programming
We propose a method of knowledge reuse between evolutionary processes that solve different optimization tasks. We define the method in the framework of tree-based genetic progra...
Wojciech Jaskowski, Krzysztof Krawiec, Bartosz Wie...