Sciweavers

5990 search results - page 1082 / 1198
» The Sampling Analysis Pattern
Sort
View
78
Voted
SIGIR
2008
ACM
14 years 10 months ago
To personalize or not to personalize: modeling queries with variation in user intent
In most previous work on personalized search algorithms, the results for all queries are personalized in the same manner. However, as we show in this paper, there is a lot of vari...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling
SIGIR
2008
ACM
14 years 10 months ago
Classifiers without borders: incorporating fielded text from neighboring web pages
Accurate web page classification often depends crucially on information gained from neighboring pages in the local web graph. Prior work has exploited the class labels of nearby p...
Xiaoguang Qi, Brian D. Davison
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 10 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
IPM
2007
158views more  IPM 2007»
14 years 10 months ago
Validation and interpretation of Web users' sessions clusters
Understanding users’ navigation on the Web is important towards improving the quality of information and the speed of accessing large-scale Web data sources. Clustering of users...
George Pallis, Lefteris Angelis, Athena Vakali
IVC
2007
130views more  IVC 2007»
14 years 10 months ago
Attribute-space connectivity and connected filters
In this paper connected operators from mathematical morphology are extended to a wider class of operators, which are based on connectivities in higher-dimensional spaces, similar ...
Michael H. F. Wilkinson
« Prev « First page 1082 / 1198 Last » Next »