|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2093 occurrences of 1202 keywords
|
|
|
Results
Found 3238 publication records. Showing 3235 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
14 | Yi-Ting Huang, Ching-I Chung, Chi-Cheng Tsai, Chia-Hsing Shen, Yu-Chieh Wu, Jie-Chi Yang |
A Mobile Video Question Answering System for E-learning. |
ICALT |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Khurum Nazir Junejo, Asim Karim |
PSSF: A Novel Statistical Approach for Personalized Service-side Spam Filtering. |
Web Intelligence |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Alistair G. Sutcliffe, Stephen Fickas, McKay Moore Sohlberg |
PC-RE: a method for personal and contextual requirements engineering with some experience. |
Requir. Eng. |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yan Jiang, Xiaoqing Ding, Qiang Fu, Zheng Ren |
Application of Bi-gram Driven Chinese Handwritten Character Segmentation for an Address Reading System. |
Document Analysis Systems |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Anthony Tomasic, John Zimmerman, Isaac Simmons |
Linking messages and form requests. |
IUI |
2006 |
DBLP DOI BibTeX RDF |
VIO, microforms, virtual information officer, machine learning, information extraction, forms, natural language analysis |
14 | Jean-Loup Chappelet, Kristian Pierre Kilchenmann |
From Market Squares to Homepages: A Survey of Swiss MPs' Interactivity. |
EGOV |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Tetsuya Hayashi |
Basket - An experimental email environment for sharing objects. |
C5 |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Ni Zhang, Yu Jiang, Binxing Fang, Li Guo 0001, Xueqi Cheng |
A traffic-classified technique for filtering spam from bulk delivery E-mails. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya |
PHONEY: Mimicking User Response to Detect Phishing Attacks. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Guoqing Mo, Wei Zhao, Haixia Cao, Jianshe Dong |
Multi-agent Interaction Based Collaborative P2P System for Fighting Spam. |
IAT |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Muhammad N. Marsono, M. Watheq El-Kharashi, Fayez Gebali |
Binary LNS-based naive Bayes hardware classifier for spam control. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Guido Schryen |
A Formal Approach towards Assessing the Effectiveness of Anti-Spam Procedures. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Hyung-Woo Lee |
SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yang Li 0002, Binxing Fang, Li Guo 0001, Shen Wang |
Research of a Novel Anti-Spam Technique Based on Users' Feedback and Improved Naive Bayesian Approach. |
ICNS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Feng Cao, David A. Bryan, Bruce Lowekamp |
Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers. |
AICT/ICIW |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Tsang-Long Pao, Jian-Bo Chen |
The Scalability of Heterogeneous Dispatcher-Based Web Server Load Balancing Architecture. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Naohiro Matsumura, Yoshihiro Sasaki |
Leader Qualification in Managing Nonprofit Organization. |
JSAI Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Kenichi Yoshida, Fuminori Adachi, Takashi Washio, Hiroshi Motoda, Teruaki Homma, Akihiro Nakashima, Hiromitsu Fujikawa, Katsuyuki Yamazaki |
Memory Management of Density-Based Spam Detector. |
SAINT |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Zhenhai Duan, Yingfei Dong, Kartik Gopalan |
A Differentiated Message Delivery Architecture to Control Spam. |
ICPADS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Masao Fuketa, El-Sayed Atlam, Hiro Hanafusa, Kazuhiro Morita, Shinkaku Kashiji, Mahmoud Rokaya, Jun-ichi Aoe |
A New Technique of Determining Speaker's Intention for Sentences in Conversation. |
KES (4) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Maria Bina, George M. Giaglis |
Exploring Early Usage Patterns of Mobile Data Services. |
ICMB |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Stefano Annese, Andrea Ghittino |
Wireless Nomadic Transfer over Mobile Ad hoc Networks. |
TRIDENTCOM |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Hui Chao, Xiaofan Lin |
Capturing the Layout of Electronic Documents for Reuse in Variable Data Printing. |
ICDAR |
2005 |
DBLP DOI BibTeX RDF |
|
14 | David Geer |
Will New Standards Help Curb Spam? |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Itai Dabran, Philippe Klein, Danny Raz |
Efficient Management of Multimedia Attachments. |
MMNS |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Jon-Finngard Moe, Eivind Sivertsen, Do Van Thanh 0001 |
Adapting Email Functionality for Mobile Terminals. |
INTELLCOMM |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Dave C. Trudgian |
Spam Classification Using Nearest Neighbour Techniques. |
IDEAL |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Kenichi Yoshida, Fuminori Adachi, Takashi Washio, Hiroshi Motoda, Teruaki Homma, Akihiro Nakashima, Hiromitsu Fujikawa, Katsuyuki Yamazaki |
Density-based spam detector. |
KDD |
2004 |
DBLP DOI BibTeX RDF |
document space density, unsupervised learning, spam, direct-mapped cache |
14 | Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano |
Public Key Encryption with Keyword Search. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Youhui Zhang, Dongsheng Wang 0002, Chongnan Gao, Weimin Zheng |
A JDO Storage Cluster Based on Object Devices. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Min-Huang Ho, Yue-Shan Chang, Shyan-Ming Yuan |
EMARE: An Email-based Mobile Agent Runtime Environment for Information. |
WMTE |
2004 |
DBLP DOI BibTeX RDF |
Information Retrieval, Mobile Computing, Mobile Agents |
14 | Yasuhiko Watanabe, Kazuya Sono, Kazuya Yokomizo, Yoshihiro Okada |
A question answer system using mails posted to a mailing list. |
ACM Symposium on Document Engineering |
2004 |
DBLP DOI BibTeX RDF |
question answer system, mailing list, sentence extraction |
14 | Helmut Berger, Dieter Merkl |
A Comparison of Text-Categorization Methods Applied to N-Gram Frequency Statistics. |
Australian Conference on Artificial Intelligence |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Chuan Zhan, Xianliang Lu, Xing Qian |
A Novel Anti-spam Email Approach Based on LVQ. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Yasuhiko Watanabe, Kazuya Sono, Kazuya Yokomizo, Yoshihiro Okada |
A Question Answer System Using Mails Posted to a Mailing List. |
IMTCI |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Jon M. Kleinberg |
Bursty and Hierarchical Structure in Streams. |
Data Min. Knowl. Discov. |
2003 |
DBLP DOI BibTeX RDF |
Markov source models, text mining, data stream algorithms |
14 | Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone Vidmar |
Are E-Commerce Users Defenceless? |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
Run time modification, Security, E-commerce, Attack |
14 | Gérard Uzan, Antony Teixeira |
Speech-based interaction as seen by blind users: from services evaluation to the evaluation of an interaction model. |
IHM |
2003 |
DBLP DOI BibTeX RDF |
listening behaviours, vocal interaction, evaluation, methods, actors |
14 | Christopher S. Campbell, Paul P. Maglio |
Supporting notable information in office work. |
CHI Extended Abstracts |
2003 |
DBLP DOI BibTeX RDF |
notable information, office work, peripheral information |
14 | Jenny Preece, Jonathan Lazar, Elizabeth F. Churchill, Hans J. J. de Graaff, Batya Friedman, Joseph A. Konstan |
Spam, spam, spam, spam: how can we stop it. |
CHI Extended Abstracts |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Steven Cohen, William Eimicke |
The Future of E-Government: A Project of Potential Trends and Issues. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Charles Consel, Laurent Réveillère |
A Programmable Client-Server Model: Robust Extensibility via DSLs. |
ASE |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Kato Tomoya, Yokoi Shigeki |
Application of P2P (Peer-to-Peer) Technology to Marketing. |
CW |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Cynthia Dwork, Andrew V. Goldberg, Moni Naor |
On Memory-Bound Functions for Fighting Spam. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Jan-Mark S. Wams, Maarten van Steen |
A Flexible Middleware Layer for User-to-User Messaging. |
DAIS |
2003 |
DBLP DOI BibTeX RDF |
|
14 | James A. Whittaker, Andres De Vivanco |
Neutralizing windows-based malicious mobile code. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
API hooking, code signing, interrupt table, native code, worm, windows, wrapper, mobile code, virus, sandbox, Microsoft Windows |
14 | Jon M. Kleinberg |
Bursty and hierarchical structure in streams. |
KDD |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Sebon Ku, Bogju Lee, Eunyong Ha |
Extracting User Profiles from E-mails Using the Set-Oriented Classifier. |
PRICAI |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Kahil Jallad, Jonathan Katz, Bruce Schneier |
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
14 | John V. Roberts |
Track-it!: help desk automation. |
SIGUCCS |
2001 |
DBLP DOI BibTeX RDF |
track-it!, work order, software, automation, help desk, inventory |
14 | Marcel Waldvogel, Radhesh Mohandas, Sherlia Shi |
EKA: Efficient Keyserver using ALMI. |
WETICE |
2001 |
DBLP DOI BibTeX RDF |
ALMI, add mostly database, synchronization, high availability, PGP, keyserver |
14 | Amit Sharma, Miriam A. M. Capretz |
Application Maintenance Using Software Agents. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
open-source Internet software application, software maintenance, software agents |
14 | Cheng-Lin Liu, Masashi Koga, Hiromichi Fujisawa |
Lexicon-Driven Handwritten Character String Recognition for Japanese Address Reading. |
ICDAR |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Michael J. Pazzani |
Knowledge discovery from data? |
IEEE Intell. Syst. |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Leandro Rodríguez Liñares, Carmen García-Mateo |
A Speaker Authentication Module in TelCorreo. |
TSD |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer |
On secure and pseudonymous client-relationships with multiple servers. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
Janus function, mailbox, persistent relationship, privacy, anonymity, pseudonym |
14 | Carlos Molina-Jiménez, Lindsay Marshall |
Anonymous and Confidential Communications from an IP Addressless Computer. |
HUC |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Jorge Dávila, Javier López 0001, René Peralta 0001 |
Implementation of Virtual Private Networks at the Transport Layer. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Dan Zhou, Joncheng C. Kuo, Susan Older, Shiu-Kai Chin |
Formal Development of Secure Email. |
HICSS |
1999 |
DBLP DOI BibTeX RDF |
high-assurance design and synthesis, secure email systems, formal methods, component-based design |
14 | Djamel A. Zighed, Myriam Côté, Nader Troudi |
The Data-Mining and the Technology af Agents to Fight the Illicit Electronic Messages. |
PAKDD |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Udo Miletzki, Thomas Bayer, Hartmut Schäfer |
Continuous Learning Systems: Postal Address Readers with Built-In Learning Capability. |
ICDAR |
1999 |
DBLP DOI BibTeX RDF |
Continuous Learning Capability, Polynomial Classifier, Stepwise Improvement Classifier SIC, learning sample set, automatic truthing, feature set |
14 | Toshihiko Yamakami, Gen-ichi Nishio |
Social Pattern Development Analysis: A Case Study in a Regional Community Network. |
Community Computing and Support Systems |
1998 |
DBLP DOI BibTeX RDF |
|
14 | Laku Chidambaram, Lai-Huat Lim, Hock Chuan Chan |
The Media Coexistence Approach: Organizational and Individual Determinants of Media Choice in Singapore. |
HICSS (1) |
1998 |
DBLP DOI BibTeX RDF |
|
14 | Ying Liu, Sargur N. Srihari |
Document Image Binarization Based on Texture Features. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1997 |
DBLP DOI BibTeX RDF |
Image processing, texture analysis, thresholding, document images |
14 | Carl Machover |
Internet Business Opportunities. |
Computer Graphics International |
1997 |
DBLP DOI BibTeX RDF |
|
14 | Gregory I. Dzuba, Alexander Filatov, Alexander Volgunin |
Handwritten ZIP Code Recognition. |
ICDAR |
1997 |
DBLP DOI BibTeX RDF |
address recognition, field localization, confidence level, feature extraction, Handwriting recognition, cross validation |
14 | Matthias Wolf 0001, Heinrich Niemann |
Form--Based Localization of the Destination Address Block on Complex Envelopes. |
ICDAR |
1997 |
DBLP DOI BibTeX RDF |
|
14 | Yahya Y. Al-Salqan, Carl K. Chang |
Temporal Relations and Synchronization Agents. |
IEEE Multim. |
1996 |
DBLP DOI BibTeX RDF |
|
14 | Jane Webster, Linda Klebe Treviño, Eric W. Stein |
Personal Nature and Ambiguity as Sources of Message Equivocality: An Extension of Media Richness Theory. |
HICSS (3) |
1996 |
DBLP DOI BibTeX RDF |
|
14 | Ramiro Liscano, Roger Impey, Paul Gordon, Suhayya Abu-Hakima |
A system for the seamless integration of personal messages using agents developed on a lotus notes platform. |
CASCON |
1996 |
DBLP BibTeX RDF |
Lotus Notes |
14 | Aloke Guha, Allalaghatta Pavan, Jonathan C. L. Liu, Barry A. Roberts |
Controlling the Process with Distributed Multimedia. |
IEEE Multim. |
1995 |
DBLP DOI BibTeX RDF |
real-time systems, asynchronous transfer mode, process control, client-server, distributed multimedia |
14 | Frans Coenen, Ian Finch, Michael J. R. Shave, Trevor J. M. Bench-Capon |
Developing Distributed Database Applications Using TSL |
DEXA |
1995 |
DBLP DOI BibTeX RDF |
|
14 | John C. Tang, Ellen Isaacs, Monica Rua |
Supporting Distributed Groups with a Montage of Lightweight Interactions. |
CSCW |
1994 |
DBLP DOI BibTeX RDF |
video, awareness, media space, informal communication, remote collaboration |
14 | Douglas B. Terry, David Goldberg 0001, David A. Nichols, Brian M. Oki |
Continuous Queries over Append-Only Databases. |
SIGMOD Conference |
1992 |
DBLP DOI BibTeX RDF |
|
14 | Betty LaPlante |
Somewhere over the network: providing services for remote users at NPAC. |
SIGUCCS |
1990 |
DBLP DOI BibTeX RDF |
|
14 | William J. Creighton |
Managing technical staff. |
SIGUCCS |
1990 |
DBLP DOI BibTeX RDF |
|
14 | J. D. Eveland, Tora K. Bikson |
Work Group Structures and Computer Support: A Field Experiment. |
ACM Trans. Inf. Syst. |
1988 |
DBLP DOI BibTeX RDF |
|
14 | Jun Murai, Akira Kato |
Researches in network development of JUNET. |
Comput. Commun. Rev. |
1987 |
DBLP DOI BibTeX RDF |
|
14 | Douglas B. Terry, Daniel C. Swinehart |
Managing Stored Voice in the Etherphone System (Extended Abstract). (long version: ACM Trans. Comput. Syst. 6(1): 3-27(1988)) |
SOSP |
1987 |
DBLP DOI BibTeX RDF |
|
14 | Christian Müller-Schloer, Neal R. Wagner |
The implementation of a cryptography-based secure office system. |
AFIPS National Computer Conference |
1982 |
DBLP DOI BibTeX RDF |
|
13 | Barry Leiba, Mike Thomas, Dave Crocker |
Author Domain Signing Practices (ADSP): Point and Counterpoint. |
IEEE Internet Comput. |
2011 |
DBLP DOI BibTeX RDF |
ADSP, DKIM, e-mail authentication |
13 | Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake |
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
flow-based attacker detection, spam mail sending hosts, botnet, DDoS attack, NetFlow |
13 | Nicol Nijland, Julia E. W. C. van Gemert-Pijnen, Saskia M. Kelders, Bart Brandenburg, Erwin R. Seydel |
Evaluation of the Use of an Ask-the-Expert e-Consultation Service for Support on Health-Related Requests. |
eTELEMED |
2010 |
DBLP DOI BibTeX RDF |
e-consultation, online patient-provider communication, primary care, Internet, e-mail |
13 | Mariam Al-Hamar, Ray Dawson, Lin Guan |
A Culture of Trust Threatens Security and Privacy in Qatar. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Spear phishing, Phishing, E-mail, Identity theft, Penetration test |
13 | Hidenori Torii, Jun Sawamoto, Norihisa Segawa, Eiji Sugino, Yukinori Nomura |
Tsunami Early Alert and Evacuation Support System for Fishery Workers by Mobile Phones. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
tsunami disaster, Area Mail, mobile phone, early warning system |
13 | Kai-Yu Wang, I-Hsien Ting, Hui-Ju Wu, Pei-Shan Chang |
A Dynamic and Task-Oriented Social Network Extraction System Based on Analyzing Personal Social Data. |
ASONAM |
2010 |
DBLP DOI BibTeX RDF |
Visualization, Social Networking, Social Network Analysis, E-mail, Instant Messenger |
13 | Masako Omori, Satoshi Hasegawa, Tomoyuki Watanabe, Shohei Matsunuma, Masaru Miyao |
Influence of Vertical Length of Characters on Readability in Mobile Phones. |
HCI (9) |
2009 |
DBLP DOI BibTeX RDF |
character size, cataract cloudiness, mobile phone e-mail and graphical characters, readability |
13 | Chun Wei, Alan P. Sprague, Gary Warner |
Clustering malware-generated spam emails with a novel fuzzy string matching algorithm. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
data mining, spam, electronic mail, forensics, cyber crime |
13 | Geoffrey Sperl |
Establishing and delivering training for the Zimbra collaboration suite. |
SIGUCCS |
2009 |
DBLP DOI BibTeX RDF |
Zimbra, collaboration, training, e-mail, calendaring |
13 | Ripan Shah, Jarrod Trevathan, Wayne Read, Hossein Ghodosi |
A Proactive Approach to Preventing Phishing Attacks Using Pshark. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Phishing e-mail, whois database, Pshark, Anti-phishing |
13 | Chun Wei, Alan P. Sprague, Gary Warner, Anthony Skjellum |
Mining spam email to identify common origins for forensic application. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
data mining, spam, electronic mail, forensic analysis, cyber crime |
13 | K. Yelupula, Srini Ramaswamy |
Social network analysis for email classification. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
business organization structures, mining e-mail archives, data mining |
13 | Chun Wei, Alan P. Sprague, Gary Warner |
Detection of networks blocks used by the Storm Worm botnet. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
data mining, spam, electronic mail, forensic analysis, cyber crime |
13 | Bassem Makni, Khaled Khelif, Rose Dieng-Kuntz, Hacène Cherfi |
Semi-automatic Construction of an Ontology and of Semantic Annotations from a Discussion Forum of a Community of Practice. |
EKAW |
2008 |
DBLP DOI BibTeX RDF |
Mail processing, Ontology, Semantic Web, Natural Language Processing, Semantic Annotation, Semantic portal |
13 | M. Dolores del Castillo, Ángel Iglesias, Jose Ignacio Serrano |
Detecting Phishing E-mails by Heterogeneous Classification. |
IDEAL |
2007 |
DBLP DOI BibTeX RDF |
web filtering, multistrategy learning, e-mail classification |
13 | Christopher Lueg, Samuel P. Martin |
Users dealing with spam and spam filters: some observations and recommendations. |
CHINZ |
2007 |
DBLP DOI BibTeX RDF |
information retrieval, spam, electronic mail, information search, informative interfaces |
13 | José Carlos Brustoloni, Ricardo Villamarín-Salomón |
Improving security decisions with polymorphic and audited dialogs. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
audited dialogs, context-sensitive guidance, e-mail client, polymorphic dialogs, virus propagation, attachment |
13 | Alex Brodsky, Dmitry Brodsky |
Trinity: distributed defense against transient spam-bots. |
PODC |
2007 |
DBLP DOI BibTeX RDF |
peer-to-peer, e-mail classification |
13 | Pavel Serdyukov, Djoerd Hiemstra, Maarten M. Fokkinga, Peter M. G. Apers |
Generative modeling of persons and documents for expert search. |
SIGIR |
2007 |
DBLP DOI BibTeX RDF |
e-mail, expertise, enterprise search, expert finding |
Displaying result #501 - #600 of 3235 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|