Sciweavers

3108 search results - page 593 / 622
» An Approach to Incremental Design of Distributed Embedded Sy...
Sort
View
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
14 years 10 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny
HRI
2006
ACM
14 years 4 months ago
Daily HRI evaluation at a classroom environment: reports from dance interaction experiments
The design and development of social robots that interact and assist people in daily life requires moving into unconstrained daily-life environments. This presents unexplored meth...
Fumihide Tanaka, Javier R. Movellan, Bret Fortenbe...
SIGSOFT
2008
ACM
14 years 11 months ago
Explicit exception handling variability in component-based product line architectures
Separation of concerns is one of the overarching goals of exception handling in order to keep separate normal and exceptional behaviour of a software system. In the context of a s...
Ivo Augusto Bertoncello, Marcelo Oliveira Dias, Pa...
KDD
2006
ACM
272views Data Mining» more  KDD 2006»
14 years 10 months ago
YALE: rapid prototyping for complex data mining tasks
KDD is a complex and demanding task. While a large number of methods has been established for numerous problems, many challenges remain to be solved. New tasks emerge requiring th...
Ingo Mierswa, Michael Wurst, Ralf Klinkenberg, Mar...
CCS
2009
ACM
14 years 5 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...