Sciweavers

2084 search results - page 326 / 417
» Knowledge Exploitation from the Web
Sort
View
ACL
2011
13 years 28 days ago
Joint Annotation of Search Queries
Marking up search queries with linguistic annotations such as part-of-speech tags, capitalization, and segmentation, is an important part of query processing and understanding in ...
Michael Bendersky, W. Bruce Croft, David A. Smith
KCAP
2011
ACM
13 years 5 days ago
An analysis of open information extraction based on semantic role labeling
Open Information Extraction extracts relations from text without requiring a pre-specified domain or vocabulary. While existing techniques have used only shallow syntactic featur...
Janara Christensen, Mausam, Stephen Soderland, Ore...
SAC
2005
ACM
14 years 2 months ago
A trust-enhanced recommender system application: Moleskiing
Recommender Systems (RS) suggests to users items they will like based on their past opinions. Collaborative Filtering (CF) is the most used technique to assess user similarity bet...
Paolo Avesani, Paolo Massa, Roberto Tiella
WWW
2008
ACM
14 years 10 months ago
VoiKiosk: increasing reachability of kiosks in developing regions
One of the several initiatives to bridge the digital divide in developing countries has been the deployment of information kiosks or knowledge centers in villages in rural parts o...
Sheetal K. Agarwal, Arun Kumar, Amit Anil Nanavati...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 4 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...