Sciweavers

585 search results - page 80 / 117
» Very Large Scale Information Retrieval
Sort
View
ECRIME
2007
14 years 1 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
WWW
2009
ACM
14 years 9 months ago
Rated aspect summarization of short comments
Web 2.0 technologies have enabled more and more people to freely comment on different kinds of entities (e.g. sellers, products, services). The large scale of information poses th...
Yue Lu, ChengXiang Zhai, Neel Sundaresan
DS
1997
117views Database» more  DS 1997»
13 years 10 months ago
Experience with a Combined Approach to Attribute-Matching Across Heterogeneous Databases
Determining attribute correspondences is a difficult, time-consuming, knowledge-intensive part of database integration. We report on experiences with tools that identified candi...
Chris Clifton, E. Housman, Arnon Rosenthal
SIGIR
2010
ACM
14 years 29 days ago
Context-aware ranking in web search
The context of a search query often provides a search engine meaningful hints for answering the current query better. Previous studies on context-aware search were either focused ...
Biao Xiang, Daxin Jiang, Jian Pei, Xiaohui Sun, En...
INFORMS
2010
177views more  INFORMS 2010»
13 years 7 months ago
Binarized Support Vector Machines
The widely used Support Vector Machine (SVM) method has shown to yield very good results in Supervised Classification problems. Other methods such as Classification Trees have bec...
Emilio Carrizosa, Belen Martin-Barragan, Dolores R...