Sciweavers

8468 search results - page 1540 / 1694
» The Technology of Data Stashing
Sort
View
CIKM
2010
Springer
14 years 8 months ago
Automatically suggesting topics for augmenting text documents
We present a method for automated topic suggestion. Given a plain-text input document, our algorithm produces a ranking of novel topics that could enrich the input document in a m...
Robert West, Doina Precup, Joelle Pineau
CIKM
2010
Springer
14 years 8 months ago
Online learning for recency search ranking using real-time user feedback
Traditional machine-learned ranking algorithms for web search are trained in batch mode, which assume static relevance of documents for a given query. Although such a batch-learni...
Taesup Moon, Lihong Li, Wei Chu, Ciya Liao, Zhaohu...
93
Voted
CIKM
2010
Springer
14 years 8 months ago
Building re-usable dictionary repositories for real-world text mining
Text mining, though still a nascent industry, has been growing quickly along with the awareness of the importance of unstructured data in business analytics, customer retention an...
Shantanu Godbole, Indrajit Bhattacharya, Ajay Gupt...
CIKM
2010
Springer
14 years 8 months ago
Top-Eye: top-k evolving trajectory outlier detection
The increasing availability of large-scale location traces creates unprecedent opportunities to change the paradigm for identifying abnormal moving activities. Indeed, various asp...
Yong Ge, Hui Xiong, Zhi-hua Zhou, Hasan Ozdemir, J...
113
Voted
CIKM
2010
Springer
14 years 8 months ago
SHRINK: a structural clustering algorithm for detecting hierarchical communities in networks
Community detection is an important task for mining the structure and function of complex networks. Generally, there are several different kinds of nodes in a network which are c...
Jianbin Huang, Heli Sun, Jiawei Han, Hongbo Deng, ...
« Prev « First page 1540 / 1694 Last » Next »