Sciweavers

CIKM
2009
Springer
14 years 3 months ago
A co-classification framework for detecting web spam and spammers in social media web sites
Social media are becoming increasingly popular and have attracted considerable attention from spammers. Using a sample of more than ninety thousand known spam Web sites, we found ...
Feilong Chen, Pang-Ning Tan, Anil K. Jain
CIKM
2009
Springer
14 years 3 months ago
Blog cascade affinity: analysis and prediction
Information propagation within the blogosphere is of much importance in implementing policies, marketing research, launching new products, and other applications. In this paper, w...
Hui Li, Sourav S. Bhowmick, Aixin Sun
CLEF
2007
Springer
14 years 3 months ago
What Happened to Esfinge in 2007?
Esfinge is a general domain Portuguese question answering system which uses the information available on the Web as an additional resource when searching for answers. Other externa...
Luís Miguel Cabral, Luís Fernando Co...
CLEF
2007
Springer
14 years 3 months ago
Experiments in Classification Clustering and Thesaurus Expansion for Domain Specific Cross-Language Retrieval
In this paper we will describe Berkeley's approach to the Domain Specific (DS) track for CLEF 2007. This year we are using forms of the Entry Vocabulary Indexes and Thesaurus...
Ray R. Larson
CLEF
2007
Springer
14 years 3 months ago
On the Application of Lexical-Syntactic Knowledge to the Answer Validation Exercise
Abstract. This paper presents a system that applies Textual Entailment recognition techniques to the AVE task. This is performed comparing representations of text snippets by means...
Óscar Ferrández, Daniel Micol, Rafae...
CIT
2007
Springer
14 years 3 months ago
An Aspect Enhanced Method of NFR Modeling in Software Architecture
Existence of crosscutting concerns in software requirements often intensifies complexity of software development. Modeling and analysis of these concerns at software architecture ...
Hamid Bagheri, Seyed-Hassan Mirian-Hosseinabadi, H...
CIT
2007
Springer
14 years 3 months ago
Mining Multiple Large Databases
: Effective data analysis using multiple databases requires highly accurate patterns. Local pattern analysis might extract low quality patterns from multiple large databases. Thus,...
Animesh Adhikari, P. R. Rao, Jhimli Adhikari
CIT
2007
Springer
14 years 3 months ago
An Approach for Assessment of Reliability of the System Using Use Case Model
Existing approaches on reliability assessment of the system have limitations such as performance entirely depends on expertise, knowledge of system analysts and computation of usa...
Debasish Kundu, Debasis Samanta
CISS
2007
IEEE
14 years 3 months ago
Energy Efficient Routing for Statistical Inference of Markov Random Fields
The problem of routing of sensor observations for optimal detection of a Markov random field (MRF) at a designated fusion center is analyzed. Assuming that the correlation structur...
Animashree Anandkumar, Lang Tong, Ananthram Swami
CISS
2007
IEEE
14 years 3 months ago
Distributed Spectrum-Efficient Routing Algorithms in Wireless Networks
Deqiang Chen, Martin Haenggi, J. Nicholas Laneman