Sciweavers

409 search results - page 48 / 82
» Review spam detection
Sort
View
SIGIR
2006
ACM
15 years 10 months ago
Learning user interaction models for predicting web search result preferences
Evaluating user preferences of web search results is crucial for search engine development, deployment, and maintenance. We present a real-world study of modeling the behavior of ...
Eugene Agichtein, Eric Brill, Susan T. Dumais, Rob...
CVPR
2010
IEEE
15 years 7 months ago
Harvesting Large-Scale Weakly-Tagged Image Databases from the Web
To leverage large-scale weakly-tagged images for computer vision tasks (such as object detection and scene recognition), a novel cross-modal tag cleansing and junk image filtering...
Jianping Fan
SDM
2007
SIAM
73views Data Mining» more  SDM 2007»
15 years 5 months ago
Sketching Landscapes of Page Farms
The Web is a very large social network. It is important and interesting to understand the “ecology” of the Web: the general relations of Web pages to their environment. The un...
Bin Zhou 0002, Jian Pei
USS
2004
15 years 5 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
LISA
2000
15 years 5 months ago
Peep (The Network Auralizer): Monitoring Your Network with Sound
Activities in complex networks are often both too important to ignore and too tedious to watch. We created a network monitoring system, Peep, that replaces visual monitoring with ...
Michael Gilfix, Alva L. Couch