Sciweavers

1968 search results - page 311 / 394
» Japanese Information Extraction with Automatically Extracted...
Sort
View
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
15 years 9 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
MM
2004
ACM
174views Multimedia» more  MM 2004»
15 years 8 months ago
Speech, ink, and slides: the interaction of content channels
In this paper, we report on an empirical exploration of digital ink and speech usage in lecture presentation. We studied the video archives of five Master’s level Computer Scien...
Richard J. Anderson, Crystal Hoyer, Craig Prince, ...
SIGIR
1999
ACM
15 years 6 months ago
Deriving Concept Hierarchies from Text
This paper presents a means of automatically deriving a hierarchical organization of concepts from a set of documents without use of training data or standard clustering technique...
Mark Sanderson, W. Bruce Croft
108
Voted
CLEF
2008
Springer
15 years 4 months ago
Assessing the Impact of Thesaurus-Based Expansion Techniques in QA-Centric IR
In this paper, we assess the impact of using thesaurus-based query expansion methods, at the Information Retrieval (IR) stage of a Question Answering (QA) system. We focus on expan...
Luís Sarmento, Jorge Teixeira, Eugén...
112
Voted
MM
2010
ACM
198views Multimedia» more  MM 2010»
15 years 2 months ago
Analyzing and predicting sentiment of images on the social web
In this paper we study the connection between sentiment of images expressed in metadata and their visual content in the social photo sharing environment Flickr. To this end, we co...
Stefan Siersdorfer, Enrico Minack, Fan Deng, Jonat...