Sciweavers

6650 search results - page 1314 / 1330
» Mutating database queries
Sort
View
WEBDB
2004
Springer
100views Database» more  WEBDB 2004»
14 years 3 months ago
Spam, Damn Spam, and Statistics: Using Statistical Analysis to Locate Spam Web Pages
The increasing importance of search engines to commercial web sites has given rise to a phenomenon we call “web spam”, that is, web pages that exist only to mislead search eng...
Dennis Fetterly, Mark Manasse, Marc Najork
BTW
2003
Springer
103views Database» more  BTW 2003»
14 years 3 months ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert
ECCV
2010
Springer
14 years 3 months ago
Fast Approximate Nearest Neighbor Methods for Non-Euclidean Manifolds with Applications to Human Activity Analysis in Videos
Approximate Nearest Neighbor (ANN) methods such as Locality Sensitive Hashing, Semantic Hashing, and Spectral Hashing, provide computationally ecient procedures for nding objects...
Rizwan Chaudhry, Yuri Ivanov
DGCI
2003
Springer
14 years 3 months ago
Shape Similarity and Visual Parts
Abstract. Human perception of shape is based on visual parts of objects to a point that a single, significant visual part is sufficient to recognize the whole object. For example,...
Longin Jan Latecki, Rolf Lakämper, Diedrich W...
CIKM
2009
Springer
14 years 2 months ago
An empirical study on using hidden markov model for search interface segmentation
This paper describes a hidden Markov model (HMM) based approach to perform search interface segmentation. Automatic processing of an interface is a must to access the invisible co...
Ritu Khare, Yuan An
« Prev « First page 1314 / 1330 Last » Next »