Sciweavers

1814 search results - page 305 / 363
» Watermarking relational data: framework, algorithms and anal...
Sort
View
KDD
2008
ACM
128views Data Mining» more  KDD 2008»
15 years 11 months ago
Bypass rates: reducing query abandonment using negative inferences
We introduce a new approach to analyzing click logs by examining both the documents that are clicked and those that are bypassed--documents returned higher in the ordering of the ...
Atish Das Sarma, Sreenivas Gollapudi, Samuel Ieong
SIGMOD
2008
ACM
65views Database» more  SIGMOD 2008»
15 years 11 months ago
Generating targeted queries for database testing
Tools for generating test queries for databases do not explicitly take into account the actual data in the database. As a consequence, such tools cannot guarantee suitable coverag...
Chaitanya Mishra, Nick Koudas, Calisto Zuzarte
WSDM
2009
ACM
112views Data Mining» more  WSDM 2009»
15 years 6 months ago
Finding text reuse on the web
With the overwhelming number of reports on similar events originating from different sources on the web, it is often hard, using existing web search paradigms, to find the origi...
Michael Bendersky, W. Bruce Croft
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
15 years 5 months ago
A Computational Approach to Style in American Poetry
We develop a quantitative method to assess the style of American poems and to visualize a collection of poems in relation to one another. Qualitative poetry criticism helped guide...
David M. Kaplan, David M. Blei
MIR
2005
ACM
128views Multimedia» more  MIR 2005»
15 years 4 months ago
Content-based image retrieval: approaches and trends of the new age
The last decade has witnessed great interest in research on content-based image retrieval. This has paved the way for a large number of new techniques and systems, and a growing i...
Ritendra Datta, Jia Li, James Ze Wang