Sciweavers

264 search results - page 46 / 53
» Capturing User Intent for Information Retrieval
Sort
View
ADMA
2008
Springer
240views Data Mining» more  ADMA 2008»
14 years 1 months ago
Automatic Web Tagging and Person Tagging Using Language Models
Abstract. Social bookmarking has become an important web2.0 application recently, which is concerned with the dual user behavior to search - tagging. Although social bookmarking we...
Qiaozhu Mei, Yi Zhang
DASFAA
2010
IEEE
220views Database» more  DASFAA 2010»
13 years 5 months ago
An Effective Object-Level XML Keyword Search
Keyword search is widely recognized as a convenient way to retrieve information from XML data. In order to precisely meet users' search concerns, we study how to effectively r...
Zhifeng Bao, Jiaheng Lu, Tok Wang Ling, Liang Xu, ...
JCS
2010
135views more  JCS 2010»
13 years 6 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
ECIR
2008
Springer
13 years 9 months ago
Discounted Cumulated Gain Based Evaluation of Multiple-Query IR Sessions
IR research has a strong tradition of laboratory evaluation of systems. Such research is based on test collections, pre-defined test topics, and standard evaluation metrics. While ...
Kalervo Järvelin, Susan L. Price, Lois M. L. ...
CSREASAM
2010
13 years 5 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj