Sciweavers

326 search results - page 20 / 66
» Misuse detection for information retrieval systems
Sort
View
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
14 years 7 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
ICIP
2006
IEEE
14 years 9 months ago
Multispectral Object Segmentation and Retrieval in Surveillance Video
This paper describes a system for object segmentation and feature extraction for surveillance video. Segmentation is performed by a dynamic vision system that fuses information fr...
Ciarán O. Conaire, Noel E. O'Connor, Eddie ...
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 11 days ago
A Novel Method for Detecting Similar Documents
We describe a system for rapidly determining document similarity among a set of documents obtained from an information retrieval (IR) system. We obtain a ranked list of the most i...
James W. Cooper, Anni Coden, Eric W. Brown
CIKM
2009
Springer
14 years 2 months ago
Exploiting bidirectional links: making spamming detection easier
Previous anti-spamming algorithms based on link structure suffer from either the weakness of the page value metric or the vagueness of the seed selection. In this paper, we propos...
Yan Zhang, Qiancheng Jiang, Lei Zhang, Yizhen Zhu
DKE
2006
122views more  DKE 2006»
13 years 7 months ago
Sampling, information extraction and summarisation of Hidden Web databases
Hidden Web databases maintain a collection of specialised documents, which are dynamically generated in response to users' queries. The majority of these documents are genera...
Yih-Ling Hedley, Muhammad Younas, Anne E. James, M...