Sciweavers

1748 search results - page 310 / 350
» A Model of Information Retrieval Based on a Terminological L...
Sort
View
RECSYS
2009
ACM
14 years 11 days ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
VLDB
1991
ACM
157views Database» more  VLDB 1991»
13 years 11 months ago
Integrating Implicit Answers with Object-Oriented Queries
Queries in object-oriented datab;Lqcs are formulated against a class and retrieve instnnccls of the class sat,isfying a certain predicate on the att,riblltes of the class. The pre...
Hava T. Siegelmann, B. R. Badrinath
APSCC
2007
IEEE
13 years 9 months ago
Consumer-Friendly Shopping Assistance by Personal Behavior Log Analysis on Ubiquitous Shop Space
: This paper has proposed a shopping assistance service. We provide consumer-friendly services which based on personal behavior log data. The consumer-friendly services are informa...
Somkiat Sae-Ueng, Sineenard Pinyapong, Akihiro Ogi...
HCI
2007
13 years 9 months ago
Static and Dynamic Hand-Gesture Recognition for Augmented Reality Applications
This contribution presents our approach for an instrumented automatic gesture recognition system for use in Augmented Reality, which is able to differentiate static and dynamic ges...
Stefan Reifinger, Frank Wallhoff, Markus Abla&szli...
ECSCW
2003
13 years 9 months ago
Discovery of Implicit and Explicit Connections Between People Using Email Utterance
This paper is about finding explicit and implicit connections between people by mining semantic associations from their email communications. Following from a sociocognitive stance...
Robert McArthur, Peter Bruza