Sciweavers

458 search results - page 85 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
ECIR
2009
Springer
14 years 4 months ago
Integrating Proximity to Subjective Sentences for Blog Opinion Retrieval
Opinion finding is a challenging retrieval task, where it has been shown that it is especially difficult to improve over a strongly performing topic-relevance baseline. In this pa...
Rodrygo L. T. Santos, Ben He, Craig Macdonald, Iad...
WWW
2010
ACM
14 years 2 months ago
Exploring searcher interactions for distinguishing types of commercial intent
An improved understanding of the relationship between search intent, result quality, and searcher behavior is crucial for improving the effectiveness of web search. While recent p...
Qi Guo, Eugene Agichtein
ACL
1998
13 years 8 months ago
Towards a Single Proposal in Spelling Correction
The study presented here relies on the integrated use of different kinds of knowledge in order to improve first-guess accuracy in non-word context-sensitive correction for general...
Eneko Agirre, Koldo Gojenola Galletebeitia, Kepa S...
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 4 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
HPCA
2012
IEEE
12 years 3 months ago
Decoupled dynamic cache segmentation
The least recently used (LRU) replacement policy performs poorly in the last-level cache (LLC) because temporal locality of memory accesses is filtered by first and second level...
Samira Manabi Khan, Zhe Wang, Daniel A. Jimé...