Sciweavers

8009 search results - page 109 / 1602
» cans 2005
Sort
View
KES
2005
Springer
15 years 10 months ago
Detecting Search Engine Spam from a Trackback Network in Blogspace
Abstract. We aim to develop a technique to detect search engine optimization (SEO) spam websites. Specifically, we propose four methods for extracting the SEO spam entries from a ...
Masahiro Kimura, Kazumi Saito, Kazuhiro Kazama, Sh...
SOFSEM
2005
Springer
15 years 10 months ago
Characteristic Patterns for LTL
We give a new characterization of those languages that are definable in fragments of LTL where the nesting depths of X and U modalities are bounded by given constants. This brings...
Antonín Kucera, Jan Strejcek
AUTOMATICA
2005
94views more  AUTOMATICA 2005»
15 years 4 months ago
Algorithms for deterministic balanced subspace identification
New algorithms for identification of a balanced state space representation are proposed. They are based on a procedure for the estimation of impulse response and sequential zero i...
Ivan Markovsky, Jan C. Willems, Paolo Rapisarda, B...
ICCAD
2005
IEEE
98views Hardware» more  ICCAD 2005»
16 years 1 months ago
Statistical based link insertion for robust clock network design
We present a statistical based non-tree clock distribution construction algorithm that starts with a tree and incrementally insert cross links, such that the skew variation of the...
Wai-Ching Douglas Lam, J. Jam, Cheng-Kok Koh, Venk...
XSYM
2005
Springer
107views Database» more  XSYM 2005»
15 years 10 months ago
Logic Wrappers and XSLT Transformations for Tuples Extraction from HTML
Abstract. Recently it was shown that existing general-purpose inductive logic programming systems are useful for learning wrappers (known as L-wrappers) to extract data from HTML d...
Costin Badica, Amelia Badica