Sciweavers

18306 search results - page 3573 / 3662
» Algorithmics in Exponential Time
Sort
View
CIE
2010
Springer
14 years 1 months ago
How Powerful Are Integer-Valued Martingales?
In the theory of algorithmic randomness, one of the central notions is that of computable randomness. An infinite binary sequence X is computably random if no recursive martingale...
Laurent Bienvenu, Frank Stephan, Jason Teutsch
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
14 years 1 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
KDD
2010
ACM
190views Data Mining» more  KDD 2010»
14 years 1 months ago
User browsing models: relevance versus examination
There has been considerable work on user browsing models for search engine results, both organic and sponsored. The click-through rate (CTR) of a result is the product of the prob...
Ramakrishnan Srikant, Sugato Basu, Ni Wang, Daryl ...
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
14 years 1 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
« Prev « First page 3573 / 3662 Last » Next »