Sciweavers

1759 search results - page 241 / 352
» Using term informativeness for named entity detection
Sort
View
WWW
2011
ACM
14 years 4 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
SACMAT
2003
ACM
15 years 3 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
14 years 4 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...
DGO
2011
285views Education» more  DGO 2011»
13 years 9 months ago
Social media use by government: from the routine to the critical
Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other services with user-generated content have made a staggering amount of information (and misinformation) available....
Andrea L. Kavanaugh, Edward A. Fox, Steven D. Shee...
GROUP
2005
ACM
15 years 3 months ago
Proactive support for the organization of shared workspaces using activity patterns and content analysis
Shared workspace systems provide virtual places for selforganized and semi-structured cooperation between local and distributed team members. These cooperation systems have been a...
Wolfgang Prinz, Baber Zaman