Sciweavers

24105 search results - page 4683 / 4821
» Models in Information Retrieval
Sort
View
205
Voted
WWW
2009
ACM
16 years 4 months ago
Smart Miner: a new framework for mining large scale web usage data
In this paper, we propose a novel framework called SmartMiner for web usage mining problem which uses link information for producing accurate user sessions and frequent navigation...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar...
143
Voted
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 9 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
122
Voted
SCHULE
2007
Springer
15 years 9 months ago
Lesen im Informatikunterricht
: Dass im Informatikunterricht Programme geschrieben werden, ist nicht ungewöhnlich. Ebenso werden Programme entworfen, getestet, analysiert und manchmal auch verändert und erwei...
Carsten Schulte
NAR
2010
143views more  NAR 2010»
14 years 10 months ago
WormBase: a comprehensive resource for nematode research
WormBase (http://www.wormbase.org) is a central data repository for nematode biology. Initially created as a service to the Caenorhabditis elegans research field, WormBase has evo...
Todd W. Harris, Igor Antoshechkin, Tamberlyn Bieri...
203
Voted
SIGIR
2012
ACM
13 years 5 months ago
TwiNER: named entity recognition in targeted twitter stream
Many private and/or public organizations have been reported to create and monitor targeted Twitter streams to collect and understand users’ opinions about the organizations. Tar...
Chenliang Li, Jianshu Weng, Qi He, Yuxia Yao, Anwi...
« Prev « First page 4683 / 4821 Last » Next »