Sciweavers

2774 search results - page 127 / 555
» Exploiting Deep Structure
Sort
View
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Splog Detection using Content, Time and Link Structures
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste netw...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
MINENET
2006
ACM
15 years 10 months ago
SVM learning of IP address structure for latency prediction
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Specifically, we consider Suppor...
Robert Beverly, Karen R. Sollins, Arthur Berger
ISCC
2002
IEEE
131views Communications» more  ISCC 2002»
15 years 9 months ago
Scheduling real time parallel structure on cluster computing
: - Efficient task scheduling is essential for achieving high performance computing applications for distributed systems. Most of existing real-time systems consider schedulability...
Reda A. Ammar, Abdulrahman Alhamdan
ER
2006
Springer
143views Database» more  ER 2006»
15 years 8 months ago
On Generating Content and Structural Annotated Websites Using Conceptual Modeling
An important milestone in the evolution of the Web is the Semantic Web: a Web in which the semantics of the available content and functionality is made explicit. Web design methods...
Sven Casteleyn, Peter Plessers, Olga De Troyer
CLIN
2004
15 years 5 months ago
Query-Based Summarization using Rhetorical Structure Theory
Research on Question Answering is focused mainly on classifying the question type and finding the answer. Presenting the answer in a way that suits the user's needs has recei...
Wauter Bosma