Sciweavers

2151 search results - page 235 / 431
» Using Document Dimensions for Enhanced Information Retrieval
Sort
View
144
Voted
DOCENG
2007
ACM
15 years 8 months ago
Elimination of junk document surrogate candidates through pattern recognition
A surrogate is an object that stands for a document and enables navigation to that document. Hypermedia is often represented with textual surrogates, even though studies have show...
Eunyee Koh, Daniel Caruso, Andruid Kerne, Ricardo ...
IAT
2008
IEEE
15 years 11 months ago
Acquiring Vague Temporal Information from the Web
Many real–world information needs are naturally formulated as queries with temporal constraints. However, the structured temporal background information needed to support such c...
Steven Schockaert, Martine De Cock, Etienne E. Ker...
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
15 years 3 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
ICDAR
2009
IEEE
15 years 11 months ago
Drop Caps Decomposition for Indexing a New Letter Extraction Method
This paper presents a new method to extract shapes in drop caps and particularly the most important shape: Letter itself. This method relies on a combination of a Aujol and Chambo...
Mickaël Coustaty, Jean-Marc Ogier, Rudolf Par...
129
Voted
WWW
2005
ACM
16 years 5 months ago
Detection of phishing webpages based on visual similarity
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate web...
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min...