Sciweavers

268 search results - page 30 / 54
» Exploiting the Similarity of Non-Matching Terms at Retrieval...
Sort
View
CIKM
2006
Springer
13 years 11 months ago
Structure-based querying of proteins using wavelets
The ability to retrieve molecules based on structural similarity has use in many applications, from disease diagnosis and treatment to drug discovery and design. In this paper, we...
Keith Marsolo, Srinivasan Parthasarathy, Kotagiri ...
WWW
2005
ACM
14 years 8 months ago
Clustering for probabilistic model estimation for CF
Based on the type of collaborative objects, a collaborative filtering (CF) system falls into one of two categories: item-based CF and user-based CF. Clustering is the basic idea i...
Qing Li, Byeong Man Kim, Sung-Hyon Myaeng
JCDL
2009
ACM
115views Education» more  JCDL 2009»
14 years 1 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
EDM
2009
120views Data Mining» more  EDM 2009»
13 years 5 months ago
Improving Student Question Classification
Students in introductory programming classes often articulate their questions and information needs incompletely. Consequently, the automatic classification of student questions to...
Cecily Heiner, Joseph L. Zachary
CIKM
2007
Springer
14 years 1 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins