Sciweavers

308 search results - page 12 / 62
» Capturing User Interests by Both Exploitation and Exploratio...
Sort
View
IUI
2000
ACM
14 years 3 days ago
Mining navigation history for recommendation
Although a user’s navigation history contains a lot of hidden information about the relationship between web pages and between users, this information is usually not exploited. ...
Xiaobin Fu, Jay Budzik, Kristian J. Hammond
CCR
2007
119views more  CCR 2007»
13 years 7 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
IBPRIA
2003
Springer
14 years 29 days ago
A User Authentication Technic Using a~Web Interaction Monitoring System
User authentication based on biometrics has explored both physiological and behavioral characteristics. We present a system, called Web Interaction Display and Monitoring (WIDAM), ...
Hugo Gamboa, Ana L. N. Fred
VISSYM
2007
13 years 10 months ago
Multi-Resolution Techniques for Visual Exploration of Large Time-Series Data
Time series are a data type of utmost importance in many domains such as business management and service monitoring. We address the problem of visualizing large time-related data ...
Ming C. Hao, Umeshwar Dayal, Daniel A. Keim, Tobia...
CP
2007
Springer
14 years 1 months ago
Tradeoffs in the Complexity of Backdoor Detection
Abstract There has been considerable interest in the identification of structural properties of combinatorial problems that lead to efficient algorithms for solving them. Some of...
Bistra N. Dilkina, Carla P. Gomes, Ashish Sabharwa...