Sciweavers

1105 search results - page 177 / 221
» Authenticating the query results of text search engines
Sort
View
ICTIR
2009
Springer
13 years 8 months ago
An Effective Approach to Verbose Queries Using a Limited Dependencies Language Model
Intuitively, any `bag of words' approach in IR should benefit from taking term dependencies into account. Unfortunately, for years the results of exploiting such dependencies ...
Eduard Hoenkamp, Peter Bruza, Dawei Song, Qiang Hu...
AIRWEB
2005
Springer
14 years 3 months ago
Web Spam, Propaganda and Trust
Web spamming, the practice of introducing artificial text and links into web pages to affect the results of searches, has been recognized as a major problem for search engines. ...
Panagiotis Takis Metaxas, Joseph DeStefano
ICDE
2004
IEEE
105views Database» more  ICDE 2004»
14 years 11 months ago
SPINE: Putting Backbone into String Indexing
The indexing technique commonly used for long strings, such as genomes, is the suffix tree, which is based on a vertical (intra-path) compaction of the underlying trie structure. ...
Naresh Neelapala, Romil Mittal, Jayant R. Haritsa
ICDM
2008
IEEE
235views Data Mining» more  ICDM 2008»
14 years 4 months ago
DECK: Detecting Events from Web Click-Through Data
In the past few years there has been increased research interest in detecting previously unidentified events from Web resources. Our focus in this paper is to detect events from ...
Ling Chen 0002, Yiqun Hu, Wolfgang Nejdl
CLEF
2007
Springer
14 years 4 months ago
Multiplying Concept Sources for Graph Modeling
This paper presents the LIG contribution to the CLEF 2007 medical retrieval task (i.e. ImageCLEFmed). The main idea in this paper is to incorporate medical knowledge in the langua...
Loïc Maisonnasse, Éric Gaussier, Jean-...