Sciweavers

25189 search results - page 30 / 5038
» Information Systems Frontiers
Sort
View
WSDM
2012
ACM
214views Data Mining» more  WSDM 2012»
12 years 5 months ago
Selecting actions for resource-bounded information extraction using reinforcement learning
Given a database with missing or uncertain content, our goal is to correct and fill the database by extracting specific information from a large corpus such as the Web, and to d...
Pallika H. Kanani, Andrew K. McCallum
CSCW
2012
ACM
12 years 5 months ago
Practices of information and secrecy in a punk rock subculture
By examining the information practices of a punk-rock subculture, we investigate the limits of social media systems, particularly limits exposed by practices of secrecy. Looking a...
Jessica Lingel, Aaron Trammell, Joe Sanchez, Mor N...
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
12 years 5 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson
AMR
2007
Springer
160views Multimedia» more  AMR 2007»
14 years 4 months ago
Information Fusion in Multimedia Information Retrieval
In retrieval, indexing and classification of multimedia data an efficient information fusion of the different modalities is essential for the system’s overall performance. Sinc...
Jana Kludas, Eric Bruno, Stéphane Marchand-...
IQ
2001
13 years 11 months ago
Information Envelope and its Information Integrity Implications
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Vijay V. Mandke, Madhavan K. Nayar, Kamna Malik