Sciweavers

8468 search results - page 1445 / 1694
» The Technology of Data Stashing
Sort
View
76
Voted
CIKM
2009
Springer
15 years 3 months ago
Ensembles in adversarial classification for spam
The standard method for combating spam, either in email or on the web, is to train a classifier on manually labeled instances. As the spammers change their tactics, the performanc...
Deepak Chinavle, Pranam Kolari, Tim Oates, Tim Fin...
CIKM
2009
Springer
15 years 3 months ago
Suffix trees for very large genomic sequences
A suffix tree is a fundamental data structure for string searching algorithms. Unfortunately, when it comes to the use of suffix trees in real-life applications, the current metho...
Marina Barsky, Ulrike Stege, Alex Thomo, Chris Upt...
92
Voted
CIKM
2009
Springer
15 years 3 months ago
Terminology mining in social media
The highly variable and dynamic word usage in social media presents serious challenges for both research and those commercial applications that are geared towards blogs or other u...
Magnus Sahlgren, Jussi Karlgren
ELPUB
2007
ACM
15 years 3 months ago
EPrints 3.0: New Capabilities for Maturing Repositories
There are now a large number of repositories in the world, contributing a significant amount of content to the world's scholars and scientists. The landscape has changed sinc...
Leslie Carr
ELPUB
2007
ACM
15 years 3 months ago
A Comparison of the Blogging Practices of UK and US Bloggers
This paper describes the results of an investigation into the differences and similarities between the blogging techniques of UK and US bloggers undertaken in the winter and sprin...
Sarah Pedersen
« Prev « First page 1445 / 1694 Last » Next »