Sciweavers

WSDM
2010
ACM
129views Data Mining» more  WSDM 2010»
14 years 6 months ago
Early Exit Optimizations for Additive Machine Learned Ranking Systems
Berkant Barla Cambazoglu, Hugo Zaragoza, Olivier C...
WSDM
2010
ACM
176views Data Mining» more  WSDM 2010»
14 years 6 months ago
Adaptive Weighing Designs for Keyword Value Computation
Georgios Zervas, John W. Byers, Michael Mitzenmach...
WSDM
2010
ACM
194views Data Mining» more  WSDM 2010»
14 years 6 months ago
Ranking with Query-Dependent Loss for Web Search
Queries describe the users' search intent and therefore they play an essential role in the context of ranking for information retrieval and Web search. However, most of exist...
Jiang Bian, Tie-Yan Liu, Tao Qin, Hongyuan Zha
WSDM
2010
ACM
160views Data Mining» more  WSDM 2010»
14 years 6 months ago
Learning Concept Importance Using a Weighted Dependence Model
Modeling query concepts through term dependencies has been shown to have a significant positive effect on retrieval performance, especially for tasks such as web search, where rel...
Michael Bendersky, Donald Metzler, W. Bruce Croft
WSDM
2010
ACM
261views Data Mining» more  WSDM 2010»
14 years 6 months ago
Learning Similarity Metrics for Event Identification in Social Media
Social media sites (e.g., Flickr, YouTube, and Facebook) are a popular distribution outlet for users looking to share their experiences and interests on the Web. These sites host ...
Hila Becker, Mor Naaman, Luis Gravano
WSDM
2010
ACM
150views Data Mining» more  WSDM 2010»
14 years 6 months ago
An Optimization Framework for Query Recommendation
Aris Anagnostopoulos, Luca Becchetti, Carlos Casti...

0
posts
with
0
views
203profile views
nelcynthEngineer
Tamilnadu Electricity Board
nelcynth
CIVR
2009
Springer
583views Image Analysis» more  CIVR 2009»
14 years 8 months ago
Mining from Large Image Sets
So far, most image mining was based on interactive querying. Although such querying will remain important in the future, several applications need image mining at such wide scale...
Luc J. Van Gool, Michael D. Breitenstein, Stephan ...
EDBT
2008
ACM
172views Database» more  EDBT 2008»
14 years 8 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...