Sciweavers

1629 search results - page 179 / 326
» A Study of Malcode-Bearing Documents
Sort
View
WWW
2011
ACM
13 years 4 months ago
Domain-independent entity extraction from web search query logs
Query logs of a Web search engine have been increasingly used as a vital source for data mining. This paper presents a study on largescale domain-independent entity extraction fro...
Alpa Jain, Marco Pennacchiotti
SIGKDD
2010
101views more  SIGKDD 2010»
13 years 3 months ago
Unexpected results in online controlled experiments
Controlled experiments, also called randomized experiments and A/B tests, have had a profound influence on multiple fields, including medicine, agriculture, manufacturing, and adv...
Ron Kohavi, Roger Longbotham
HICSS
2011
IEEE
168views Biometrics» more  HICSS 2011»
13 years 28 days ago
WordBridge: Using Composite Tag Clouds in Node-Link Diagrams for Visualizing Content and Relations in Text Corpora
We introduce WordBridge, a novel graph-based visualization technique for showing relationships between entities in text corpora. The technique is a node-link visualization where b...
KyungTae Kim, Sungahn Ko, Niklas Elmqvist, David S...
AIL
2011
12 years 9 months ago
Argumentation mining
Argumentation is the process by which arguments are constructed and handled. Argumentation constitutes a major component of human intelligence. The ability to engage in argumentat...
Raquel Mochales Palau, Marie-Francine Moens
WWW
2004
ACM
14 years 9 months ago
Mining anchor text for query refinement
When searching large hypertext document collections, it is often possible that there are too many results available for ambiguous queries. Query refinement is an interactive proce...
Reiner Kraft, Jason Y. Zien