Sciweavers

2286 search results - page 391 / 458
» The Combination and Evaluation of Query Performance Predicti...
Sort
View
JMLR
2006
132views more  JMLR 2006»
14 years 11 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
WWW
2005
ACM
16 years 15 days ago
A multilingual usage consultation tool based on internet searching: more than a search engine, less than QA
We present a usage consultation tool, based on Internet searching, for language learners. When a user enters a string of words for which he wants to find usages, the system sends ...
Kumiko Tanaka-Ishii, Hiroshi Nakagawa
DASFAA
2009
IEEE
133views Database» more  DASFAA 2009»
15 years 6 months ago
Probabilistic Ranking in Uncertain Vector Spaces
Abstract. In many application domains, e.g. sensor databases, traffic management or recognition systems, objects have to be compared based on positionally and existentially uncert...
Thomas Bernecker, Hans-Peter Kriegel, Matthias Ren...
MDM
2009
Springer
118views Communications» more  MDM 2009»
15 years 6 months ago
DigestJoin: Exploiting Fast Random Reads for Flash-Based Joins
Abstract—Flash disks have been an emerging secondary storage media. In particular, there have been portable devices, multimedia players and laptop computers that are configured ...
Yu Li, Sai Tung On, Jianliang Xu, Byron Choi, Haib...
SIGIR
2009
ACM
15 years 6 months ago
Building enriched document representations using aggregated anchor text
It is well known that anchor text plays a critical role in a variety of search tasks performed over hypertextual domains, including enterprise search, wiki search, and web search....
Donald Metzler, Jasmine Novak, Hang Cui, Srihari R...