Sciweavers

53 search results - page 8 / 11
» Intrusion detection using text processing techniques with a ...
Sort
View
DIAL
2006
IEEE
117views Image Analysis» more  DIAL 2006»
14 years 2 months ago
Document Image Retrieval using Signatures as Queries
In searching a repository of business documents, a task of interest is that of using a query signature image to retrieve from a database, other signatures matching the query. The ...
Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Ha...
BMCBI
2006
114views more  BMCBI 2006»
13 years 8 months ago
BLISS: biding site level identification of shared signal-modules in DNA regulatory sequences
Background: Regulatory modules are segments of the DNA that control particular aspects of gene expression. Their identification is therefore of great importance to the field of mo...
Hailong Meng, Arunava Banerjee, Lei Zhou
AIRWEB
2009
Springer
14 years 2 months ago
Looking into the past to better classify web spam
Web spamming techniques aim to achieve undeserved rankings in search results. Research has been widely conducted on identifying such spam and neutralizing its influence. However,...
Na Dai, Brian D. Davison, Xiaoguang Qi
TKDE
2010
186views more  TKDE 2010»
13 years 6 months ago
A Unified Framework for Providing Recommendations in Social Tagging Systems Based on Ternary Semantic Analysis
—Social Tagging is the process by which many users add metadata in the form of keywords, to annotate and categorize items (songs, pictures, web links, products, etc.). Social tag...
Panagiotis Symeonidis, Alexandros Nanopoulos, Yann...
ICASSP
2010
IEEE
13 years 8 months ago
Summarization- and learning-based approaches to information distillation
Information distillation is the task that aims to extract relevant passages of text from massive volumes of textual and audio sources, given a query. In this paper, we investigate...
Boriska Toth, Dilek Hakkani-Tür, Sibel Yaman