Sciweavers

785 search results - page 145 / 157
» A Framework for Decentralized Ranking in Web Information Ret...
Sort
View
WEBI
2010
Springer
13 years 5 months ago
On Using Query Logs for Static Index Pruning
Static index pruning techniques aim at removing from the posting lists of an inverted file the references to documents which are likely to be not relevant for answering user querie...
Hoang Thanh Lam, Raffaele Perego, Fabrizio Silvest...
WWW
2009
ACM
14 years 8 months ago
Learning to recognize reliable users and content in social media with coupled mutual reinforcement
Community Question Answering (CQA) has emerged as a popular forum for users to pose questions for other users to answer. Over the last few years, CQA portals such as Naver and Yah...
Jiang Bian, Yandong Liu, Ding Zhou, Eugene Agichte...
P2P
2006
IEEE
229views Communications» more  P2P 2006»
14 years 1 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
IDEAS
2009
IEEE
232views Database» more  IDEAS 2009»
14 years 2 months ago
RDFKB: efficient support for RDF inference queries and knowledge management
RDFKB (Resource Description Framework Knowledge Base) is a relational database system for RDF datasets which supports inference and knowledge management. Significant research has ...
James P. McGlothlin, Latifur R. Khan
NDSS
2002
IEEE
14 years 17 days ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman