Sciweavers

167 search results - page 15 / 34
» On the provenance of non-answers to queries over extracted d...
Sort
View
IEEEARES
2010
IEEE
14 years 1 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
WWW
2002
ACM
14 years 8 months ago
Probabilistic query expansion using query logs
Query expansion has long been suggested as an effective way to resolve the short query and word mismatching problems. A number of query expansion methods have been proposed in tra...
Hang Cui, Ji-Rong Wen, Jian-Yun Nie, Wei-Ying Ma
CAISE
2005
Springer
14 years 1 months ago
Estimating Recall and Precision for Vague Queries in Databases
In vague queries, a user enters a value that represents some real world object and expects as the result the set of database values that represent this real world object even with ...
Raquel Kolitski Stasiu, Carlos A. Heuser, Roberto ...
PERCOM
2005
ACM
14 years 7 months ago
Supporting Topographic Queries in a Class of Networked Sensor Systems
Topographic querying is the process of extracting data from a sensor network for understanding the graphic delineation of features of interest in a terrain. Query processing techn...
Mitali Singh, Viktor K. Prasanna
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
14 years 8 months ago
Mining broad latent query aspects from search sessions
Search queries are typically very short, which means they are often underspecified or have senses that the user did not think of. A broad latent query aspect is a set of keywords ...
Xuanhui Wang, Deepayan Chakrabarti, Kunal Punera