Sciweavers

741 search results - page 120 / 149
» An Analysis of Rule Evaluation Metrics
Sort
View
WWW
2009
ACM
14 years 8 months ago
Probabilistic question recommendation for question answering communities
User-Interactive Question Answering (QA) communities such as Yahoo! Answers are growing in popularity. However, as these QA sites always have thousands of new questions posted dai...
Mingcheng Qu, Guang Qiu, Xiaofei He, Cheng Zhang, ...
KDD
2008
ACM
128views Data Mining» more  KDD 2008»
14 years 8 months ago
Bypass rates: reducing query abandonment using negative inferences
We introduce a new approach to analyzing click logs by examining both the documents that are clicked and those that are bypassed--documents returned higher in the ordering of the ...
Atish Das Sarma, Sreenivas Gollapudi, Samuel Ieong
WWW
2010
ACM
14 years 2 months ago
CETR: content extraction via tag ratios
We present Content Extraction via Tag Ratios (CETR) – a method to extract content text from diverse webpages by using the HTML document’s tag ratios. We describe how to comput...
Tim Weninger, William H. Hsu, Jiawei Han
BPM
2009
Springer
161views Business» more  BPM 2009»
14 years 2 months ago
Trace Clustering Based on Conserved Patterns: Towards Achieving Better Process Models
Process mining refers to the extraction of process models from event logs. Real-life processes tend to be less structured and more flexible. Traditional process mining algorithms ...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...
INFOCOM
2006
IEEE
14 years 1 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...