Sciweavers

1368 search results - page 88 / 274
» The Implicit Pipeline Method
Sort
View
126
Voted
CORR
2006
Springer
118views Education» more  CORR 2006»
15 years 26 days ago
Minimally Invasive Randomization for Collecting Unbiased Preferences from Clickthrough Logs
Clickthrough data is a particularly inexpensive and plentiful resource to obtain implicit relevance feedback for improving and personalizing search engines. However, it is well kn...
Filip Radlinski, Thorsten Joachims
DLOG
2010
14 years 11 months ago
Correcting Access Restrictions to a Consequence
Recent research has shown that annotations are useful for representing access restrictions to the axioms of an ontology and their implicit consequences. Previous work focused on co...
Martin Knechtel, Rafael Peñaloza
95
Voted
DCC
2006
IEEE
16 years 12 days ago
Compression and Machine Learning: A New Perspective on Feature Space Vectors
The use of compression algorithms in machine learning tasks such as clustering and classification has appeared in a variety of fields, sometimes with the promise of reducing probl...
D. Sculley, Carla E. Brodley
91
Voted
RE
2009
Springer
15 years 7 months ago
Trust Trade-off Analysis for Security Requirements Engineering
Abstract—Security requirements often have implicit assumptions about trust relationships among actors. The more actors trust each other, the less stringent the security requireme...
Golnaz Elahi, Eric S. K. Yu
107
Voted
CGI
2004
IEEE
15 years 4 months ago
BlobTree Trees
In recent years several methods for modeling botanical trees have been proposed. The geometry and topology of tree skeletons can be well described by L-systems; however, there are...
Callum Galbraith, Peter MacMurchy, Brian Wyvill