Sciweavers

178 search results - page 24 / 36
» Specificity Aboutness in XML Retrieval
Sort
View
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
14 years 7 months ago
Preservation of proximity privacy in publishing numerical sensitive data
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...
Jiexing Li, Yufei Tao, Xiaokui Xiao
IPM
2000
96views more  IPM 2000»
13 years 7 months ago
Further reflections on TREC
The paper reviews the TREC Programme up to TREC-6 (1997), considering the test results, the substantive findings for IR that follow, and the lessons TREC offers for IR evaluation....
Karen Sparck Jones
BMCBI
2010
123views more  BMCBI 2010»
13 years 7 months ago
eGIFT: Mining Gene Information from the Literature
Background: With the biomedical literature continually expanding, searching PubMed for information about specific genes becomes increasingly difficult. Not only can thousands of r...
Catalina O. Tudor, Carl J. Schmidt, K. Vijay-Shank...
WWW
2009
ACM
14 years 2 months ago
Ranking user-created contents by search user's inclination in online communities
Searching posts effectively has become an important issue in large-scale online communities. Especially, if search users have different inclinations when they search posts, they h...
Hyoseop Shin, Jeehoon Lee
KDD
2004
ACM
116views Data Mining» more  KDD 2004»
14 years 25 days ago
A system for automated mapping of bill-of-materials part numbers
Part numbers are widely used within an enterprise throughout the manufacturing process. The point of entry of such part numbers into this process is normally via a Bill of Materia...
Jayant Kalagnanam, Moninder Singh, Sudhir Verma, M...