Sciweavers

2977 search results - page 591 / 596
» Evaluating the Effectiveness of Keyword Search
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
SIGMOD
2010
ACM
201views Database» more  SIGMOD 2010»
13 years 7 months ago
I4E: interactive investigation of iterative information extraction
Information extraction systems are increasingly being used to mine structured information from unstructured text documents. A commonly used unsupervised technique is to build iter...
Anish Das Sarma, Alpa Jain, Divesh Srivastava
CORR
2006
Springer
180views Education» more  CORR 2006»
13 years 7 months ago
Social Networks and Social Information Filtering on Digg
The new social media sites--blogs, wikis, Flickr and Digg, among others--underscore the transformation of the Web to a participatory medium in which users are actively creating, e...
Kristina Lerman
IJSWIS
2006
108views more  IJSWIS 2006»
13 years 7 months ago
Information Retrieval by Semantic Similarity
Abstract. Semantic Similarity relates to computing the similarity between conceptually similar but not necessarily lexically similar terms. Typically, semantic similarity is comput...
Angelos Hliaoutakis, Giannis Varelas, Epimenidis V...
PERCOM
2006
ACM
13 years 7 months ago
Incorporating Wireless Technology into Virtual Organizations Supporting the Work of Healthcare Teams
This study investigates how a virtual organization can be built in a distributed computing environment which includes wireless technology to support the work of a multi-disciplina...
Mohyuddin, W. A. Gray, David Morrey, Wendy Jones