Sciweavers

409 search results - page 53 / 82
» Text Mining Techniques to Support e-Democracy Systems
Sort
View
SIGSOFT
2007
ACM
14 years 8 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
KDD
2000
ACM
115views Data Mining» more  KDD 2000»
13 years 11 months ago
A framework for specifying explicit bias for revision of approximate information extraction rules
Information extraction is one of the most important techniques used in Text Mining. One of the main problems in building information extraction (IE) systems is that the knowledge ...
Ronen Feldman, Yair Liberzon, Binyamin Rosenfeld, ...
BMCBI
2005
117views more  BMCBI 2005»
13 years 7 months ago
An evaluation of GO annotation retrieval for BioCreAtIvE and GOA
Background: The Gene Ontology Annotation (GOA) database http://www.ebi.ac.uk/GOA aims to provide high-quality supplementary GO annotation to proteins in the UniProt Knowledgebase....
Evelyn Camon, Daniel Barrell, Emily Dimmer, Vivian...
ICDIM
2008
IEEE
14 years 2 months ago
A geo-temporal Web gazetteer integrating data from multiple sources
This paper presents a geo-temporal gazetteer Web service that provides access to names of places and historical periods, together with the associated geotemporal information. With...
Hugo Manguinhas, Bruno Martins, José Luis B...
SIGIR
2010
ACM
13 years 2 months ago
Efficient partial-duplicate detection based on sequence matching
With the ever-increasing growth of the Internet, numerous copies of documents become serious problem for search engine, opinion mining and many other web applications. Since parti...
Qi Zhang, Yue Zhang, Haomin Yu, Xuanjing Huang