Sciweavers

105 search results - page 17 / 21
» Email Analysis and Information Extraction for Enterprise Ben...
Sort
View
RIAO
2004
13 years 8 months ago
Ontologies as Background Knowledge to Explore Document Collections
This paper introduces a new approach to provide users with solutions to explore a domain via an information space. A key point in our approach is that information searching and ex...
Nathalie Aussenac-Gilles, Josiane Mothe
SIGIR
2008
ACM
13 years 7 months ago
Multi-document summarization via sentence-level semantic analysis and symmetric matrix factorization
Multi-document summarization aims to create a compressed summary while retaining the main characteristics of the original set of documents. Many approaches use statistics and mach...
Dingding Wang, Tao Li, Shenghuo Zhu, Chris H. Q. D...
KDD
2010
ACM
323views Data Mining» more  KDD 2010»
13 years 9 months ago
TIARA: a visual exploratory text analytic system
In this paper, we present a novel exploratory visual analytic system called TIARA (Text Insight via Automated Responsive Analytics), which combines text analytics and interactive ...
Furu Wei, Shixia Liu, Yangqiu Song, Shimei Pan, Mi...
ADC
2005
Springer
183views Database» more  ADC 2005»
14 years 1 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
DSN
2008
IEEE
14 years 1 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...