Sciweavers

1759 search results - page 249 / 352
» Using term informativeness for named entity detection
Sort
View
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
15 years 7 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
EFDBS
2003
14 years 11 months ago
Four-Level-Architecture for Closure in Interoperability
A definition of types in an information system is given from ld abstractions through data constructs, schema and definitions to physical data values. Category theory suggests tha...
B. Nick Rossiter, Michael A. Heather
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
15 years 10 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
VTC
2008
IEEE
125views Communications» more  VTC 2008»
15 years 4 months ago
A Bio-Inspired Scheduling Scheme for Wireless Sensor Networks
— Sensor networks with a large amount of sensor nodes usually have high redundancy in sensing coverage. The network lifetime can be further extended by proper scheduling and putt...
Chi-Tsun Cheng, Chi Kong Tse, Francis C. M. Lau
MM
2005
ACM
147views Multimedia» more  MM 2005»
15 years 3 months ago
Video inpainting and restoration techniques
Aged films may contain defects such as spikes or dirt, as well as long vertical defect lines. These defects were produced in file development or due to improper maintenance of fil...
Rong-Chi Chang, Louis H. Lin, Chia-Ton Tian, Timot...