Sciweavers

409 search results - page 53 / 82
» Text Mining Techniques to Support e-Democracy Systems
Sort
View
110
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
KDD
2000
ACM
115views Data Mining» more  KDD 2000»
15 years 4 months ago
A framework for specifying explicit bias for revision of approximate information extraction rules
Information extraction is one of the most important techniques used in Text Mining. One of the main problems in building information extraction (IE) systems is that the knowledge ...
Ronen Feldman, Yair Liberzon, Binyamin Rosenfeld, ...
121
Voted
BMCBI
2005
117views more  BMCBI 2005»
15 years 11 days ago
An evaluation of GO annotation retrieval for BioCreAtIvE and GOA
Background: The Gene Ontology Annotation (GOA) database http://www.ebi.ac.uk/GOA aims to provide high-quality supplementary GO annotation to proteins in the UniProt Knowledgebase....
Evelyn Camon, Daniel Barrell, Emily Dimmer, Vivian...
ICDIM
2008
IEEE
15 years 7 months ago
A geo-temporal Web gazetteer integrating data from multiple sources
This paper presents a geo-temporal gazetteer Web service that provides access to names of places and historical periods, together with the associated geotemporal information. With...
Hugo Manguinhas, Bruno Martins, José Luis B...
SIGIR
2010
ACM
14 years 7 months ago
Efficient partial-duplicate detection based on sequence matching
With the ever-increasing growth of the Internet, numerous copies of documents become serious problem for search engine, opinion mining and many other web applications. Since parti...
Qi Zhang, Yue Zhang, Haomin Yu, Xuanjing Huang