Sciweavers

5758 search results - page 1050 / 1152
» Anonymity-preserving data collection
Sort
View
SIGIR
2006
ACM
14 years 4 months ago
Probabilistic latent query analysis for combining multiple retrieval sources
Combining the output from multiple retrieval sources over the same document collection is of great importance to a number of retrieval tasks such as multimedia retrieval, web retr...
Rong Yan, Alexander G. Hauptmann
SIGIR
2006
ACM
14 years 4 months ago
Near-duplicate detection by instance-level constrained clustering
For the task of near-duplicated document detection, both traditional fingerprinting techniques used in database community and bag-of-word comparison approaches used in information...
Hui Yang, James P. Callan
VALUETOOLS
2006
ACM
113views Hardware» more  VALUETOOLS 2006»
14 years 4 months ago
Load prediction models in web-based systems
Run-time management of modern Web-based services requires the integration of several algorithms and mechanisms for job dispatching, load sharing, admission control, overload detec...
Mauro Andreolini, Sara Casolari
VALUETOOLS
2006
ACM
166views Hardware» more  VALUETOOLS 2006»
14 years 4 months ago
Web graph analyzer tool
We present the software tool “Web Graph Analyzer”. This tool is designed to perform a comprehensive analysis of the Web Graph structure. By Web Graph we mean a graph whose ver...
Konstantin Avrachenkov, Danil Nemirovsky, Natalia ...
W4A
2006
ACM
14 years 4 months ago
Dialog generation for voice browsing
In this paper we present our voice browser system, HearSay, which provides efficient access to the World Wide Web to people with visual disabilities. HearSay includes contentbased...
Zan Sun, Amanda Stent, I. V. Ramakrishnan
« Prev « First page 1050 / 1152 Last » Next »