Sciweavers

8468 search results - page 1401 / 1694
» The Technology of Data Stashing
Sort
View
SIGECOM
2005
ACM
118views ECommerce» more  SIGECOM 2005»
15 years 4 months ago
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular t...
Nicolas Christin, Andreas S. Weigend, John Chuang
SIGIR
2005
ACM
15 years 4 months ago
When will information retrieval be "good enough"?
We describe a user study that examined the relationship between the quality of an Information Retrieval system and the effectiveness of its users in performing a task. The task i...
James Allan, Ben Carterette, Joshua Lewis
SIGIR
2005
ACM
15 years 4 months ago
A geometric interpretation of r-precision and its correlation with average precision
We consider two of the most commonly cited measures of retrieval performance: average precision and R-precision. It is well known that average precision and R-precision are highly...
Javed A. Aslam, Emine Yilmaz, Virgiliu Pavlu
SIGIR
2005
ACM
15 years 4 months ago
Relevance weighting for query independent evidence
A query independent feature, relating perhaps to document content, linkage or usage, can be transformed into a static, per-document relevance weight for use in ranking. The challe...
Nick Craswell, Stephen E. Robertson, Hugo Zaragoza...
SIGIR
2005
ACM
15 years 4 months ago
Web-based acquisition of Japanese katakana variants
This paper describes a method of detecting Japanese Katakana variants from a large corpus. Katakana words, which are mainly used as loanwords, cause problems with information retr...
Takeshi Masuyama, Hiroshi Nakagawa
« Prev « First page 1401 / 1694 Last » Next »