Sciweavers

2554 search results - page 46 / 511
» Keyword query cleaning
Sort
View
DSN
2005
IEEE
14 years 1 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
KDD
2007
ACM
169views Data Mining» more  KDD 2007»
14 years 8 months ago
Exploiting underrepresented query aspects for automatic query expansion
Users attempt to express their search goals through web search queries. When a search goal has multiple components or aspects, documents that represent all the aspects are likely ...
Daniel Crabtree, Peter Andreae, Xiaoying Gao
KDD
2001
ACM
228views Data Mining» more  KDD 2001»
14 years 8 months ago
REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive indust
REVI-MINER is a KDD-environment which supports the detection and analysis of deviations in warranty and goodwill cost statements. The system was developed within the framework of ...
Edgar Hotz, Udo Grimmer, W. Heuser, Gholamreza Nak...
CHI
2008
ACM
14 years 8 months ago
Playful toothbrush: ubicomp technology for teaching tooth brushing to kindergarten children
This case study in UbiComp technology and design presents a "Playful Toothbrush" system for assisting parents and teachers to motivate kindergarten children to learn pro...
Yu-Chen Chang, Jin-Ling Lo, Chao-Ju Huang, Nan-Yi ...
ICADL
2005
Springer
114views Education» more  ICADL 2005»
14 years 1 months ago
Scalability of Databases for Digital Libraries
Search engines of main-stream literature digital libraries such as ACM Digital Library, Google Scholar, and PubMed employ file-based systems, and provide users with a basic boolean...
John Chmura, Nattakarn Ratprasartporn, Gultekin &O...