Sciweavers

8468 search results - page 1621 / 1694
» The Technology of Data Stashing
Sort
View
SIGIR
2006
ACM
15 years 3 months ago
A statistical method for system evaluation using incomplete judgments
We consider the problem of large-scale retrieval evaluation, and we propose a statistical method for evaluating retrieval systems using incomplete judgments. Unlike existing techn...
Javed A. Aslam, Virgiliu Pavlu, Emine Yilmaz
SIGIR
2006
ACM
15 years 3 months ago
Semantic term matching in axiomatic approaches to information retrieval
A common limitation of many retrieval models, including the recently proposed axiomatic approaches, is that retrieval scores are solely based on exact (i.e., syntactic) matching o...
Hui Fang, ChengXiang Zhai
SIGIR
2006
ACM
15 years 3 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
SPAA
2006
ACM
15 years 3 months ago
Modeling instruction placement on a spatial architecture
In response to current technology scaling trends, architects are developing a new style of processor, known as spatial computers. A spatial computer is composed of hundreds or eve...
Martha Mercaldi, Steven Swanson, Andrew Petersen, ...
W4A
2006
ACM
15 years 3 months ago
How people use presentation to search for a link: expanding the understanding of accessibility on the web
It is well known that many Web pages are difficult for visually disabled people to use. Without access to a rich, visual display, the intended structure and organisation of the pa...
Caroline Jay, Robert Stevens, Mashhuda Glencross, ...
« Prev « First page 1621 / 1694 Last » Next »