Sciweavers

708 search results - page 123 / 142
» Identifying Content Blocks from Web Documents
Sort
View
CMS
2006
158views Communications» more  CMS 2006»
13 years 9 months ago
On the Privacy Risks of Publishing Anonymized IP Network Traces
Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of p...
D. Koukis, Spyros Antonatos, Kostas G. Anagnostaki...
EMNLP
2009
13 years 5 months ago
Statistical Estimation of Word Acquisition with Application to Readability Prediction
Models of language learning play a central role in a wide range of applications: from psycholinguistic theories of how people acquire new word knowledge, to information systems th...
Paul Kidwell, Guy Lebanon, Kevyn Collins-Thompson
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 7 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
SEMWEB
2007
Springer
14 years 1 months ago
Media Watch on Climate Change: Building and Visualizing Contextualized Information Spaces
Abstract. This paper presents the ’Media Watch on Climate Change’, an interactive Web portal that combines a portfolio of semantic services with a visual interface based on tig...
Arno Scharl, Albert Weichselbraun, Alexander Hubma...
VLDB
2002
ACM
193views Database» more  VLDB 2002»
13 years 7 months ago
REFEREE: An Open Framework for Practical Testing of Recommender Systems using ResearchIndex
Automated recommendation (e.g., personalized product recommendation on an ecommerce web site) is an increasingly valuable service associated with many databases--typically online ...
Dan Cosley, Steve Lawrence, David M. Pennock