Sciweavers

SIGIR
1996
ACM
14 years 3 months ago
Viewing Stemming as Recall Enhancement
Previous research on stemming has shown both positive and negative effects on retrieval performance. This paper describes an experiment in which several linguistic and non-linguis...
Wessel Kraaij, Renée Pohlmann
SIGIR
1996
ACM
14 years 3 months ago
Retrieving Spoken Documents by Combining Multiple Index Sources
This paper presents domain-independent methods of spoken document retrieval. Both a continuous-speech large vocabulary recognition system, and a phone-lattice word spotter, are us...
Gareth J. F. Jones, J. T. Foote, Karen Sparck Jone...
SIGIR
1996
ACM
14 years 3 months ago
A Deductive Data Model for Query Expansion
We present a deductive data model for concept-based query expansion. It is based abstraction levels: the conceptual, the expression and the occurrence level. Concepts and their re...
Kalervo Järvelin, Jaana Kristensen, Timo Niem...
SIGIR
1996
ACM
14 years 3 months ago
Evaluating User Interfaces to Information Retrieval Systems: A Case Study on User Support
Designing good user interfaces to information retrieval systems is a complex activity. The design space is large and evaluation methodologies that go beyond the classical precisio...
Giorgio Brajnik, Stefano Mizzaro, Carlo Tasso
SIGIR
1996
ACM
14 years 3 months ago
Performance Evaluation of a Distributed Architecture for Information Retrieval
Information explosion across the Internet and elsewhere offers access to an increasing number of document collections. In order for users to e ectively access these collections, i...
Brendon Cahoon, Kathryn S. McKinley
KES
1997
Springer
14 years 3 months ago
Formal verification of the correctness in hybrid expert systems
Simon C. K. Shiu, James N. K. Liu, Daniel S. Yeung
KES
1997
Springer
14 years 3 months ago
Theoretical methods for planning and control in mobile robotics
Henrik I. Christensen, Paolo Pirjanian
ISW
1997
Springer
14 years 3 months ago
Threshold Proxy Signature Schemes
This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshol...
Kan Zhang