Sciweavers

301 search results - page 41 / 61
» Summarization evaluation using relative utility
Sort
View
ACSAC
2001
IEEE
14 years 1 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
WWW
2002
ACM
14 years 10 months ago
A machine learning based approach for table detection on the web
Table is a commonly used presentation scheme, especially for describing relational information. However, table understanding remains an open problem. In this paper, we consider th...
Yalin Wang, Jianying Hu
CHI
2011
ACM
13 years 1 months ago
Twitinfo: aggregating and visualizing microblogs for event exploration
Microblogs are a tremendous repository of user-generated content about world events. However, for people trying to understand events by querying services like Twitter, a chronolog...
Adam Marcus 0002, Michael S. Bernstein, Osama Bada...
LREC
2008
143views Education» more  LREC 2008»
13 years 11 months ago
Building Affective Lexicons from Specific Corpora for Automatic Sentiment Analysis
Automatic sentiment analysis in texts has attracted considerable attention in recent years. Most of the approaches developed to classify texts or sentences as positive or negative...
Yves Bestgen
CSE
2009
IEEE
14 years 4 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi