Sciweavers

326 search results - page 15 / 66
» Misuse detection for information retrieval systems
Sort
View
SIGIR
2004
ACM
14 years 25 days ago
Constructing a text corpus for inexact duplicate detection
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. The goal of this work i...
Jack G. Conrad, Cindy P. Schriber
JCDL
2011
ACM
374views Education» more  JCDL 2011»
12 years 10 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
SIGIR
2010
ACM
13 years 11 months ago
A ranking approach to target detection for automatic link generation
We focus on the task of target detection in automatic link generation with Wikipedia, i.e., given an N-gram in a snippet of text, find the relevant Wikipedia concepts that explai...
Jiyin He, Maarten de Rijke
WIDM
2005
ACM
14 years 29 days ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...
ICPR
2004
IEEE
14 years 8 months ago
Facial Image Retrieval Based on Demographic Classification
In this paper we propose a novel method for demographic classification and present an image retrieval system that can retrieve facial images by demographic information that includ...
Bo Wu, Chang Huang, Haizhou Ai