Sciweavers

1641 search results - page 318 / 329
» Termination Analysis with Algorithmic Learning
Sort
View
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
15 years 9 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
WWW
2010
ACM
15 years 4 months ago
Optimal rare query suggestion with implicit user feedback
Query suggestion has been an effective approach to help users narrow down to the information they need. However, most of existing studies focused on only popular/head queries. Si...
Yang Song, Li-wei He
CIKM
2009
Springer
15 years 4 months ago
Helping editors choose better seed sets for entity set expansion
Sets of named entities are used heavily at commercial search engines such as Google, Yahoo and Bing. Acquiring sets of entities typically consists of combining semi-supervised exp...
Vishnu Vyas, Patrick Pantel, Eric Crestan
MM
2006
ACM
152views Multimedia» more  MM 2006»
15 years 3 months ago
Local image representations using pruned salient points with applications to CBIR
Salient points are locations in an image where there is a significant variation with respect to a chosen image feature. Since the set of salient points in an image capture import...
Hui Zhang, Rouhollah Rahmani, Sharath R. Cholleti,...
AINA
2005
IEEE
15 years 3 months ago
iHITS: Extending HITS for Personal Interests Profiling
Ever since the boom of World Wide Web, profiling online users' interests has become an important task for content providers. The traditional approach involves manual entry of...
Ziming Zhuang