Sciweavers

100 search results - page 16 / 20
» Using Data Fusion and Web Mining to Support Feature Location...
Sort
View
CIKM
2005
Springer
14 years 1 months ago
Maximal termsets as a query structuring mechanism
Search engines process queries conjunctively to restrict the size of the answer set. Further, it is not rare to observe a mismatch between the vocabulary used in the text of Web p...
Bruno Pôssas, Nivio Ziviani, Berthier A. Rib...
JUCS
2006
225views more  JUCS 2006»
13 years 7 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke
NAR
2011
182views Computer Vision» more  NAR 2011»
12 years 10 months ago
PAIR: the predicted Arabidopsis interactome resource
The predicted Arabidopsis interactome resource (PAIR, http://www.cls.zju.edu.cn/pair/), comprised of 5990 experimentally reported molecular interactions in Arabidopsis thaliana to...
Mingzhi Lin, Xueling Shen, Xin Chen
SEMCO
2008
IEEE
14 years 1 months ago
Using Similarity Measures for Context-Aware User Interfaces
Context-aware user interfaces facilitate the user interaction by suggesting or prefilling data derived from the user’s current context. This raises the problem of mapping conte...
Melanie Hartmann, Torsten Zesch, Max Mühlh&au...
ACSAC
2005
IEEE
14 years 1 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi