Sciweavers

3770 search results - page 625 / 754
» Building a Stochastic Dynamic Model of Application Use
Sort
View
ICDM
2009
IEEE
98views Data Mining» more  ICDM 2009»
14 years 3 months ago
Topic Distributions over Links on Web
—It is well known that Web users create links with different intentions. However, a key question, which is not well studied, is how to categorize the links and how to quantify th...
Jie Tang, Jing Zhang, Jeffrey Xu Yu, Zi Yang, Keke...
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
14 years 3 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
CCS
2010
ACM
13 years 9 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami
ICASSP
2010
IEEE
13 years 9 months ago
Automatic state discovery for unstructured audio scene classification
In this paper we present a novel scheme for unstructured audio scene classification that possesses three highly desirable and powerful features: autonomy, scalability, and robust...
Julian Ramos, Sajid M. Siddiqi, Artur Dubrawski, G...
JSA
2006
86views more  JSA 2006»
13 years 9 months ago
The design and utility of the ML-RSIM system simulator
Execution-driven simulation has become the primary method for evaluating architectural techniques as it facilitates rapid design space exploration without the cost of building pro...
Lambert Schaelicke, Michael Parker