Sciweavers

1750 search results - page 320 / 350
» Abduction in Classification Tasks
Sort
View
AP2PS
2009
IEEE
14 years 3 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
CLEF
2007
Springer
14 years 2 months ago
MIRACLE at ImageCLEFanot 2007: Machine Learning Experiments on Medical Image Annotation
This paper describes the participation of MIRACLE research consortium at the ImageCLEF Medical Image Annotation task of ImageCLEF 2007. Our areas of expertise do not include image...
Sara Lana-Serrano, Julio Villena-Román, Jos...
HICSS
2006
IEEE
163views Biometrics» more  HICSS 2006»
14 years 2 months ago
Learning Ranking vs. Modeling Relevance
The classical (ad hoc) document retrieval problem has been traditionally approached through ranking according to heuristically developed functions (such as tf.idf or bm25) or gene...
Dmitri Roussinov, Weiguo Fan
NORDICHI
2006
ACM
14 years 2 months ago
The FaceReader: measuring instant fun of use
Recently, more and more attention has been paid to emotions in the domain of Human-Computer Interaction. When evaluating a product, one can no longer ignore the emotions a product...
Bieke Zaman, Tara Shrimpton-Smith
ELPUB
2007
ACM
14 years 17 days ago
Automatic Sentiment Analysis in On-line Text
The growing stream of content placed on the Web provides a huge collection of textual resources. People share their experiences on-line, ventilate their opinions (and frustrations...
Erik Boiy, Pieter Hens, Koen Deschacht, Marie-Fran...