Sciweavers

2877 search results - page 535 / 576
» Learn to weight terms in information retrieval using categor...
Sort
View
UIST
2004
ACM
14 years 1 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
SIGUCCS
2003
ACM
14 years 1 months ago
Achieving rapid service deployment in an academic environment
Rapid product or service deployment is most commonly thought of in the corporate, rather than academic, environment. Utilizing a rapid deployment process and a number of highly de...
Shea Nangle
CIKM
2011
Springer
12 years 7 months ago
Towards feature selection in network
Traditional feature selection methods assume that the data are independent and identically distributed (i.i.d.). In real world, tremendous amounts of data are distributed in a net...
Quanquan Gu, Jiawei Han
KDD
2008
ACM
174views Data Mining» more  KDD 2008»
14 years 8 months ago
Effective label acquisition for collective classification
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
Mustafa Bilgic, Lise Getoor
KDD
2007
ACM
169views Data Mining» more  KDD 2007»
14 years 8 months ago
Exploiting underrepresented query aspects for automatic query expansion
Users attempt to express their search goals through web search queries. When a search goal has multiple components or aspects, documents that represent all the aspects are likely ...
Daniel Crabtree, Peter Andreae, Xiaoying Gao