Sciweavers

326 search results - page 7 / 66
» Misuse detection for information retrieval systems
Sort
View
ECIR
2008
Springer
13 years 8 months ago
Towards an Automatically Generated Music Information System Via Web Content Mining
Abstract. This paper presents first steps towards building a music information system like last.fm, but with the major difference that the data is automatically retrieved from the ...
Markus Schedl, Peter Knees, Tim Pohle, Gerhard Wid...
CLEF
2010
Springer
13 years 8 months ago
External and Intrinsic Plagiarism Detection Using a Cross-Lingual Retrieval and Segmentation System - Lab Report for PAN at CLEF
We present our hybrid system for the PAN challenge at CLEF 2010. Our system performs plagiarism detection for translated and non-translated externally as well as intrinsically plag...
Markus Muhr, Roman Kern, Mario Zechner, Michael Gr...
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 1 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
ACMSE
2007
ACM
13 years 11 months ago
Hierarchical land cover information retrieval in object-oriented remote sensing image databases with native queries
Classification and change detection of land cover types in the remotely sensed images is one of the major applications in remote sensing. This paper presents a hierarchical framew...
Jiang Li
SIGIR
2010
ACM
13 years 7 months ago
Can search systems detect users' task difficulty?: some behavioral signals
In this paper, we report findings on how user behaviors vary in tasks with different difficulty levels as well as of different types. Two behavioral signals: document dwell time a...
Jingjing Liu, Chang Liu, Jacek Gwizdka, Nicholas J...