Sciweavers

7839 search results - page 1456 / 1568
» What's there and what's not
Sort
View
IICAI
2003
15 years 2 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
TREC
2001
15 years 2 months ago
Link-based Approaches for Text Retrieval
We assess a family of ranking mechanisms for search engines based on linkage analysis using a carefully engineered subset of the World Wide Web, WT10g (Bailey, Craswell and Hawking...
Julien Gevrey, Stefan M. Rüger
107
Voted
SODA
2004
ACM
111views Algorithms» more  SODA 2004»
15 years 2 months ago
Reconstructing strings from random traces
We are given a collection of m random subsequences (traces) of a string t of length n where each trace is obtained by deleting each bit in the string with probability q. Our goal ...
Tugkan Batu, Sampath Kannan, Sanjeev Khanna, Andre...
TREC
2004
15 years 2 months ago
TREC Novelty Track at IRIT-SIG
In TREC 2004, IRIT modified important features of the strategy that was developed for TREC 2003. Changes include tuning parameter values, topic expansion and exploitation of sente...
Taoufiq Dkaki, Josiane Mothe
TREC
2004
15 years 2 months ago
Overview of the TREC 2004 Question Answering Track
The TREC 2004 Question Answering track contained a single task in which question series were used to define a set of targets. Each series contained factoid and list questions and ...
Ellen M. Voorhees
« Prev « First page 1456 / 1568 Last » Next »