Sciweavers

326 search results - page 44 / 66
» Can Affect Be Detected from Intelligent Tutoring System Inte...
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Urban terrain tracking in high clutter with waveform-agility
We consider the problem of tracking a maneuvering target in urban terrain with high clutter. Although multipath has been previously exploited to improve target tracking in complex...
Bhavana Chakraborty, Jun Jason Zhang, Antonia Papa...
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
14 years 5 months ago
Pairwise Interaction Tensor Factorization for Personalized Tag Recommendation
Tagging plays an important role in many recent websites. Recommender systems can help to suggest a user the tags he might want to use for tagging a specific item. Factorization mo...
Steffen Rendle, Lars Schmidt-Thieme
KBSE
2007
IEEE
14 years 2 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
EMNLP
2009
13 years 5 months ago
Discriminative Corpus Weight Estimation for Machine Translation
Current statistical machine translation (SMT) systems are trained on sentencealigned and word-aligned parallel text collected from various sources. Translation model parameters ar...
Spyros Matsoukas, Antti-Veikko I. Rosti, Bing Zhan...
WWW
2008
ACM
14 years 8 months ago
Social and semantics analysis via non-negative matrix factorization
Social media such as Web forum often have dense interactions between user and content where network models are often appropriate for analysis. Joint non-negative matrix factorizat...
Zhi-Li Wu, Chi-Wa Cheng, Chun-hung Li