Sciweavers

2244 search results - page 199 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
137
Voted
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 9 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
RIDE
2003
IEEE
15 years 7 months ago
Event Information Extraction Using Link Grammar
In this paper, we present a scheme for identifying instances of events and extracting information about them. The scheme can handle all events with which an action can be associat...
Harsha V. Madhyastha, N. Balakrishnan, K. R. Ramak...
234
Voted
JCDL
2011
ACM
374views Education» more  JCDL 2011»
14 years 5 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
SIGIR
2009
ACM
15 years 9 months ago
Reducing long queries using query quality predictors
Long queries frequently contain many extraneous terms that hinder retrieval of relevant documents. We present techniques to reduce long queries to more effective shorter ones tha...
Giridhar Kumaran, Vitor R. Carvalho
BCSHCI
2007
15 years 4 months ago
Interaction designers' use of their repertoire in meetings with clients
An important part of an interaction designer’s work is meeting with clients during design sessions. It is of great importance that the designers participate in establishing some...
Per Sökjer