Text-based Information Retrieval (T-IR)
a Workshop organized by Benno Stein. Content Extraction (from Web pages) Filter lines based on the content to tags ratio.</p> a <- ASCII character...
a Workshop organized by Benno Stein. Content Extraction (from Web pages) Filter lines based on the content to tags ratio.</p> a <- ASCII character...
by John Wilkes, Jeffrey Mogul, and Jaap Suermondt This paper elaborates on utilitfication - the transfer of applications to utility computing. Utility comput...
This paper presents an approach for providing optimal access to multiple resources combined to a virtual resource through an information retrieval agent. The...
This paper describes optimizing the design of a shopbot (=shopping robot) which considers, the intrinsic value of the product, the disutility from waiting, ...
Bratus, Sergey, Masone, Chris and Smith, Sean W. (2008). ''Why Do Street-Smart People Do Stupid Things Online?'', IEEE Security and Privacy, IEEE Computer So...
Leidner, Jochen L. (2006). ''An evaluation dataset for the toponym resolution task'', Computers, Environment and Urban Systems, pages 400-417 This paper moti...
Rauch, Erik and Bukatin, Michael and Baker, Kenneth (2003). ''A confidence-based framework for disambiguating geographic terms'', Proceedings of the HLT-NAAC...
Martins, Bruno and Silva, Mário J. and Chaves, Marcirio Silveira (2005). ''Challenges and resources for evaluating geographical IR'', GIR '05: Proceedings of...
by Segaran Toby An excellent guide to programming Web 2.0 applications, with code examples and excellent explanations of the used techniques. Similarity Metr...
by Dimitry Zibold The following article summarizes some interesting aspects from Dimitry's research: A Shingle is a contiguous sub-sequence of tokens in a d...
by Carlos Jensen et. al The paper presents a approach for analyzing the privacy practice of Web sites. The iWatch crawler garners information regarding Coo...
by Mannan, Mohammad and van Oorschot, Paul This article introduces a technique for sharing personal data based on the contact lists of instant messaging (IM)...
Motahari et. al identify seven privacy threads: Inappropriate use by administrators legal obligations: e.g. police inadequate security design invasions (poo...
by Ralph Gross and Alessandro Acquisti (+) The article provides an excellent literature review and trust and intimacy in online networking and on the partici...
Human-aided filtering can make the difference (by Bob Zeidman). Bob presents in this article how human-aided filtering can improve filtering accuracy. At fir...